9.3
CVSSv2

CVE-2009-3873

Published: 05/11/2009 Updated: 30/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 1000
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x prior to 1.4.2_24 allows remote malicious users to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 1.6.0

sun jre 1.6.0

sun jdk 1.5.0

sun jre 1.5.0

sun sdk 1.4.2_20

sun sdk 1.4.2_17

sun sdk 1.4.2_13

sun sdk 1.4.2_5

sun sdk 1.4.2_09

sun sdk 1.4.2_01

sun jre 1.4.2_12

sun jre 1.4.2_13

sun jre 1.4.2_9

sun jre 1.4.2_8

sun jre 1.4.2_06

sun jre 1.4.2_03

sun jre 1.4.2_16

sun jre 1.4.2_17

sun sdk 1.4.2_9

sun sdk 1.4.2_8

sun sdk 1.4.2_11

sun sdk 1.4.2_14

sun sdk 1.4.2_2

sun sdk 1.4.2_1

sun sdk 1.4.2_10

sun sdk 1.4.2_04

sun sdk 1.4.2_22

sun jre 1.4.2_7

sun jre 1.4.2_6

sun jre 1.4.2_1

sun jre 1.4.2_07

sun jre 1.4.2_21

sun jre 1.4.2_20

sun sdk 1.4.2_7

sun sdk 1.4.2_6

sun sdk 1.4.2_19

sun sdk 1.4.2_16

sun sdk 1.4.2_08

sun sdk 1.4.2_03

sun sdk 1.4.2_05

sun sdk 1.4.2_07

sun jre 1.4.2_18

sun jre 1.4.2_14

sun jre 1.4.2_15

sun jre 1.4.2_5

sun jre 1.4.2_4

sun jre 1.4.2_04

sun jre 1.4.2_19

sun sdk 1.4.2_18

sun sdk 1.4.2_15

sun sdk 1.4.2_12

sun sdk 1.4.2_3

sun sdk 1.4.2_21

sun sdk 1.4.2_4

sun sdk 1.4.2_02

sun sdk 1.4.2_06

sun jre 1.4.2_10

sun jre 1.4.2_11

sun jre 1.4.2_3

sun jre 1.4.2_2

sun jre 1.4.2_02

sun jre 1.4.2_05

sun jre 1.4.2_09

sun jre 1.4.2_08

sun jre 1.4.2_22

sun sdk 1.3.1_23

sun sdk 1.3.1_15

sun sdk 1.3.1_08

sun sdk 1.3.1_07

sun sdk 1.3.1_02

sun sdk 1.3.1_20

sun sdk 1.3.1_16

sun sdk 1.3.1_24

sun sdk 1.3.1_25

sun jre 1.3.1_06

sun jre 1.3.1_07

sun jre 1.3.1_08

sun jre 1.3.1_14

sun jre 1.3.1_15

sun jre 1.3.1_21

sun jre 1.3.1_22

sun jre 1.3.1_8

sun sdk 1.3.1_13

sun sdk 1.3.1_14

sun sdk 1.3.1_05

sun sdk 1.3.1_06

sun sdk 1.3.1_01a

sun sdk 1.3.1_19

sun sdk 1.3.1_5

sun sdk 1.3.1_2

sun jre 1.3.1_04

sun jre 1.3.1_05

sun jre 1.3.1_12

sun jre 1.3.1_13

sun jre 1.3.1_2

sun jre 1.3.1_20

sun jre 1.3.1_5

sun jre 1.3.1_6

sun jre 1.3.1_7

sun sdk 1.3.1_7

sun sdk 1.3.1_12

sun sdk 1.3.1_11

sun sdk 1.3.1_04

sun sdk 1.3.1_22

sun sdk 1.3.1_01

sun sdk 1.3.1_3

sun sdk 1.3.1_6

sun jre 1.3.1_02

sun jre 1.3.1_03

sun jre 1.3.1_10

sun jre 1.3.1_11

sun jre 1.3.1_18

sun jre 1.3.1_19

sun jre 1.3.1_3

sun jre 1.3.1_4

sun jre 1.3.1_9

sun sdk 1.3.1_9

sun sdk 1.3.1_8

sun sdk 1.3.1_09

sun sdk 1.3.1_10

sun sdk 1.3.1_03

sun sdk 1.3.1_21

sun sdk 1.3.1_17

sun sdk 1.3.1_18

sun sdk 1.3.1_4

sun jre 1.3.1_01

sun jre 1.3.1_01a

sun jre 1.3.1_09

sun jre 1.3.1_1

sun jre 1.3.1_16

sun jre 1.3.1_17

sun jre 1.3.1_23

sun jre 1.3.1_24

sun jre 1.3.1_25

sun jre 1.4.2_01

Vendor Advisories

Synopsis Critical: java-160-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by the R ...
Synopsis Low: Red Hat Network Satellite Server IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Network Satellite Server 53This update has been rated as having low security impact by th ...
Dan Kaminsky discovered that SSL certificates signed with MD2 could be spoofed given enough time As a result, an attacker could potentially create a malicious trusted certificate to impersonate another site This update handles this issue by completely disabling MD2 for certificate validation in OpenJDK (CVE-2009-2409) ...

Exploits

Netragard, LLC Advisory - Mac OS X Java Runtime suffers from buffer overflows that allow for remote code execution ...

References

CWE-119http://java.sun.com/javase/6/webnotes/6u17.htmlhttp://secunia.com/advisories/37231http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1http://securitytracker.com/id?1023132http://www.vupen.com/english/advisories/2009/3131http://www.securityfocus.com/bid/36881http://secunia.com/advisories/37239http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.htmlhttp://security.gentoo.org/glsa/glsa-200911-02.xmlhttp://lists.apple.com/archives/security-announce/2009/Dec/msg00000.htmlhttp://secunia.com/advisories/37581http://secunia.com/advisories/37386http://support.apple.com/kb/HT3970http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.htmlhttp://support.apple.com/kb/HT3969http://www.redhat.com/support/errata/RHSA-2009-1694.htmlhttp://secunia.com/advisories/37841http://www.mandriva.com/security/advisories?name=MDVSA-2010:084http://marc.info/?l=bugtraq&m=131593453929393&w=2http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.htmlhttp://marc.info/?l=bugtraq&m=134254866602253&w=2http://marc.info/?l=bugtraq&m=126566824131534&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9602https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8396https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6970https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11746https://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2009:1694https://usn.ubuntu.com/859-1/