Lucene search

K
saintSAINT CorporationSAINT:841F8294878AE089D1ABB007D555B259
HistoryNov 06, 2009 - 12:00 a.m.

Java Runtime Environment HsbParser.getSoundBank Stack Buffer Overflow

2009-11-0600:00:00
SAINT Corporation
download.saintcorporation.com
17

9.3 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.938 High

EPSS

Percentile

99.1%

Added: 11/06/2009
CVE: CVE-2009-3867
BID: 36881
OSVDB: 59711

Background

The Java Runtime Environment (JRE) is part of the Java Development Kit (JDK), a set of programming tools for developing Java applications. The Java Runtime Environment provides the minimum requirements for executing a Java application; it consists of the Java Virtual Machine (JVM), core classes, and supporting files.

Problem

A stack buffer overflow vulnerability in the way the JRE getSoundbank() function parses long file:// URL arguments allows remote attackers to execute arbitrary commands.

Resolution

Apply one of the solutions shown in Sun Microsystems’ response.

References

<http://www.zerodayinitiative.com/advisories/ZDI-09-076/&gt;

Limitations

Exploit works on Sun Microsystems Java Runtime Environment 6 and requires the user to open the exploit page in Mozilla Firefox 2.0.X.

Platforms

Windows

9.3 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.938 High

EPSS

Percentile

99.1%