10
CVSSv2

CVE-2009-1095

Published: 25/03/2009 Updated: 10/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and previous versions, and 6 Update 12 and previous versions, allows remote malicious users to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 1.5.0

sun jre 1.5.0

sun jre

sun jdk

sun jre 1.6.0

sun jdk 1.6.0

Vendor Advisories

It was discovered that font creation could leak temporary files If a user were tricked into loading a malicious program or applet, a remote attacker could consume disk space, leading to a denial of service (CVE-2006-2426, CVE-2009-1100) ...
Synopsis Important: java-160-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-160-openjdk packages that fix several security issues arenow available for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security R ...
Synopsis Critical: java-160-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by the R ...
Synopsis Critical: java-160-sun security update Type/Severity Security Advisory: Critical Topic Updated java-160-sun packages that correct several security issues arenow available for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by t ...
Synopsis Critical: java-150-sun security update Type/Severity Security Advisory: Critical Topic Updated java-150-sun packages that correct several security issues arenow available for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by t ...
Synopsis Critical: java-150-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-150-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by the R ...
Synopsis Low: Red Hat Network Satellite Server IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Network Satellite Server 53This update has been rated as having low security impact by th ...

References

CWE-189http://sunsolve.sun.com/search/document.do?assetkey=1-26-254570-1http://sunsolve.sun.com/search/document.do?assetkey=1-21-125137-14-1http://www.redhat.com/support/errata/RHSA-2009-0392.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2009-108.htmhttp://support.avaya.com/elmodocs2/security/ASA-2009-109.htmhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=781http://www.ubuntu.com/usn/usn-748-1http://www.securityfocus.com/bid/34240http://www.securitytracker.com/id?1021894http://www.redhat.com/support/errata/RHSA-2009-0394.htmlhttp://secunia.com/advisories/34489https://rhn.redhat.com/errata/RHSA-2009-0377.htmlhttp://secunia.com/advisories/34496http://secunia.com/advisories/34495http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00001.htmlhttp://www.debian.org/security/2009/dsa-1769http://secunia.com/advisories/34675http://secunia.com/advisories/34632http://www.redhat.com/support/errata/RHSA-2009-1038.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-05/msg00003.htmlhttp://secunia.com/advisories/35223http://secunia.com/advisories/35156http://secunia.com/advisories/35255http://www.vupen.com/english/advisories/2009/1426http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133http://marc.info/?l=bugtraq&m=124344236532162&w=2http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.htmlhttp://secunia.com/advisories/35416http://www.mandriva.com/security/advisories?name=MDVSA-2009:137http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00001.htmlhttp://secunia.com/advisories/35776http://www.mandriva.com/security/advisories?name=MDVSA-2009:162https://rhn.redhat.com/errata/RHSA-2009-1198.htmlhttp://secunia.com/advisories/36185http://security.gentoo.org/glsa/glsa-200911-02.xmlhttp://secunia.com/advisories/37386http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlhttp://www.vupen.com/english/advisories/2009/3316http://secunia.com/advisories/37460http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020225.1-1http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.htmlhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6643https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10124http://www.securityfocus.com/archive/1/507985/100/0/threadedhttps://usn.ubuntu.com/748-1/https://nvd.nist.gov