9.3
CVSSv2

CVE-2009-3869

Published: 05/11/2009 Updated: 30/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x prior to 1.3.1_27, and SDK and JRE 1.4.x prior to 1.4.2_24 allows remote malicious users to execute arbitrary code via a crafted argument, aka Bug Id 6872357.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 1.5.0

sun jdk 1.6.0

sun jre 1.6.0

sun jre 1.5.0

sun jre 1.4.2 1

sun jre 1.4.2 2

sun jre 1.4.2 02

sun jre 1.4.2 3

sun jre 1.4.2 03

sun jre 1.4.2 4

sun jre 1.4.2 04

sun jre 1.4.2 05

sun jre 1.4.2 5

sun jre 1.4.2 6

sun jre 1.4.2 06

sun jre 1.4.2 07

sun jre 1.4.2 7

sun jre 1.4.2 8

sun jre 1.4.2 08

sun jre 1.4.2 9

sun jre 1.4.2 09

sun jre 1.4.2 10

sun jre 1.4.2 11

sun jre 1.4.2 12

sun jre 1.4.2 13

sun jre 1.4.2 14

sun jre 1.4.2 15

sun jre 1.4.2 16

sun jre 1.4.2 17

sun jre 1.4.2 18

sun jre 1.4.2 19

sun jre 1.4.2 20

sun jre 1.4.2 21

sun jre 1.4.2 22

sun sdk 1.4.2 1

sun sdk 1.4.2 01

sun sdk 1.4.2 02

sun sdk 1.4.2 2

sun sdk 1.4.2 3

sun sdk 1.4.2 03

sun sdk 1.4.2 04

sun sdk 1.4.2 4

sun sdk 1.4.2 5

sun sdk 1.4.2 05

sun sdk 1.4.2 06

sun sdk 1.4.2 6

sun sdk 1.4.2 7

sun sdk 1.4.2 07

sun sdk 1.4.2 8

sun sdk 1.4.2 08

sun sdk 1.4.2 9

sun sdk 1.4.2 09

sun sdk 1.4.2 10

sun sdk 1.4.2 11

sun sdk 1.4.2 12

sun sdk 1.4.2 13

sun sdk 1.4.2 14

sun sdk 1.4.2 15

sun sdk 1.4.2 16

sun sdk 1.4.2 17

sun sdk 1.4.2 18

sun sdk 1.4.2 19

sun sdk 1.4.2 20

sun sdk 1.4.2 21

sun sdk 1.4.2 22

sun jre 1.3.1 1

sun jre 1.3.1 01

sun jre 1.3.1 01a

sun jre 1.3.1 02

sun jre 1.3.1 2

sun jre 1.3.1 03

sun jre 1.3.1 3

sun jre 1.3.1 04

sun jre 1.3.1 4

sun jre 1.3.1 5

sun jre 1.3.1 05

sun jre 1.3.1 06

sun jre 1.3.1 6

sun jre 1.3.1 07

sun jre 1.3.1 7

sun jre 1.3.1 08

sun jre 1.3.1 8

sun jre 1.3.1 9

sun jre 1.3.1 09

sun jre 1.3.1 10

sun jre 1.3.1 11

sun jre 1.3.1 12

sun jre 1.3.1 13

sun jre 1.3.1 14

sun jre 1.3.1 15

sun jre 1.3.1 16

sun jre 1.3.1 17

sun jre 1.3.1 18

sun jre 1.3.1 19

sun jre 1.3.1 20

sun jre 1.3.1 21

sun jre 1.3.1 22

sun jre 1.3.1 23

sun jre 1.3.1 24

sun jre 1.3.1 25

sun sdk 1.3.1 01

sun sdk 1.3.1 01a

sun sdk 1.3.1 02

sun sdk 1.3.1 2

sun sdk 1.3.1 03

sun sdk 1.3.1 3

sun sdk 1.3.1 4

sun sdk 1.3.1 04

sun sdk 1.3.1 05

sun sdk 1.3.1 5

sun sdk 1.3.1 6

sun sdk 1.3.1 06

sun sdk 1.3.1 07

sun sdk 1.3.1 7

sun sdk 1.3.1 8

sun sdk 1.3.1 08

sun sdk 1.3.1 9

sun sdk 1.3.1 09

sun sdk 1.3.1 10

sun sdk 1.3.1 11

sun sdk 1.3.1 12

sun sdk 1.3.1 13

sun sdk 1.3.1 14

sun sdk 1.3.1 15

sun sdk 1.3.1 16

sun sdk 1.3.1 17

sun sdk 1.3.1 18

sun sdk 1.3.1 19

sun sdk 1.3.1 20

sun sdk 1.3.1 21

sun sdk 1.3.1 22

sun sdk 1.3.1 23

sun sdk 1.3.1 24

sun sdk 1.3.1 25

sun jre 1.4.2 01

Vendor Advisories

Synopsis Critical: java-160-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by the R ...
Synopsis Low: Red Hat Network Satellite Server IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Network Satellite Server 53This update has been rated as having low security impact by th ...
Dan Kaminsky discovered that SSL certificates signed with MD2 could be spoofed given enough time As a result, an attacker could potentially create a malicious trusted certificate to impersonate another site This update handles this issue by completely disabling MD2 for certificate validation in OpenJDK (CVE-2009-2409) ...

Exploits

## # $Id: java_setdifficm_bofrb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' ...
This Metasploit module exploits a flaw in the setDiffICM function in the Sun JVM The payload is serialized and passed to the applet via PARAM tags It must be a native payload The effected Java versions are JDK and JRE 6 Update 16 and earlier, JDK and JRE 50 Update 21 and earlier, SDK and JRE 142_23 and earlier, and SDK and JRE 131_26 and ea ...
Netragard, LLC Advisory - Mac OS X Java Runtime suffers from buffer overflows that allow for remote code execution ...

Recent Articles

Investigation Report for the September 2014 Equation malware detection incident in the US
Securelist • Kaspersky Lab • 16 Nov 2017

In early October, a story was published by the Wall Street Journal alleging Kaspersky Lab software was used to siphon classified data from an NSA employee’s home computer system. Given that Kaspersky Lab has been at the forefront of fighting cyberespionage and cybercriminal activities on the Internet for over 20 years now, these allegations were treated very seriously. To assist any independent investigators and all the people who have been asking us questions whether those allegations were tr...

References

CWE-119http://www.vupen.com/english/advisories/2009/3131http://www.securityfocus.com/bid/36881http://java.sun.com/javase/6/webnotes/6u17.htmlhttp://securitytracker.com/id?1023132http://secunia.com/advisories/37231http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1http://zerodayinitiative.com/advisories/ZDI-09-078/http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.htmlhttp://secunia.com/advisories/37239http://security.gentoo.org/glsa/glsa-200911-02.xmlhttp://lists.apple.com/archives/security-announce/2009/Dec/msg00000.htmlhttp://support.apple.com/kb/HT3970http://secunia.com/advisories/37386http://secunia.com/advisories/37581http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.htmlhttp://support.apple.com/kb/HT3969http://secunia.com/advisories/37841http://www.redhat.com/support/errata/RHSA-2009-1694.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:084http://marc.info/?l=bugtraq&m=131593453929393&w=2http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.htmlhttp://marc.info/?l=bugtraq&m=134254866602253&w=2http://marc.info/?l=bugtraq&m=126566824131534&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8566https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7400https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11262https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10741https://access.redhat.com/errata/RHSA-2009:1694https://nvd.nist.govhttps://usn.ubuntu.com/859-1/https://www.exploit-db.com/exploits/16298/