5
CVSSv2

CVE-2009-2671

Published: 05/08/2009 Updated: 10/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote malicious users to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 6

sun jre 6

sun jre 5.0

sun jdk 5.0

sun jdk

sun jre

Vendor Advisories

It was discovered that the XML HMAC signature system did not correctly check certain lengths If an attacker sent a truncated HMAC, it could bypass authentication, leading to potential privilege escalation (CVE-2009-0217) ...
Synopsis Critical: java-150-sun security update Type/Severity Security Advisory: Critical Topic Updated java-150-sun packages that correct several security issues arenow available for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by t ...
Synopsis Critical: java-160-sun security update Type/Severity Security Advisory: Critical Topic Updated java-160-sun packages that correct several security issues arenow available for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by t ...
Synopsis Important: java-160-openjdk security and bug fix update Type/Severity Security Advisory: Important Topic Updated java-160-openjdk packages that fix several security issues and abug are now available for Red Hat Enterprise Linux 5This update has been rated as having important security impact by ...
Synopsis Low: Red Hat Network Satellite Server IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Network Satellite Server 53This update has been rated as having low security impact by th ...

References

NVD-CWE-noinfohttp://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1http://secunia.com/advisories/36162http://www.securityfocus.com/bid/35943http://java.sun.com/javase/6/webnotes/6u15.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.htmlhttps://rhn.redhat.com/errata/RHSA-2009-1199.htmlhttp://secunia.com/advisories/36180https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.htmlhttp://secunia.com/advisories/36176http://www.securitytracker.com/id?1022659https://rhn.redhat.com/errata/RHSA-2009-1201.htmlhttps://rhn.redhat.com/errata/RHSA-2009-1200.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.htmlhttp://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20http://secunia.com/advisories/36199http://secunia.com/advisories/36248http://www.mandriva.com/security/advisories?name=MDVSA-2009:209http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.htmlhttp://www.vupen.com/english/advisories/2009/2543http://www.us-cert.gov/cas/techalerts/TA09-294A.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.htmlhttp://marc.info/?l=bugtraq&m=125787273209737&w=2http://secunia.com/advisories/37300http://security.gentoo.org/glsa/glsa-200911-02.xmlhttp://secunia.com/advisories/37386http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlhttp://secunia.com/advisories/37460http://www.vupen.com/english/advisories/2009/3316http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/52336https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8259https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11115http://www.securityfocus.com/archive/1/507985/100/0/threadedhttps://usn.ubuntu.com/814-1/https://nvd.nist.gov