Vulnerability Name: | CVE-2009-1106 (CCN-49459) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2009-03-23 | ||||||||||||||||||||||||||||||||||||
Published: | 2009-03-23 | ||||||||||||||||||||||||||||||||||||
Updated: | 2018-10-10 | ||||||||||||||||||||||||||||||||||||
Summary: | The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P) 4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2009-1106 Source: HP Type: UNKNOWN SSRT090058 Source: CCN Type: HP Security Bulletin HPSBMA02445 SSRT090058 rev.1 HP Serviceguard Manager, Remote Execution of Arbitrary Code, Denial of Service (DoS) Source: SUSE Type: UNKNOWN SUSE-SA:2009:016 Source: SUSE Type: UNKNOWN SUSE-SA:2009:036 Source: HP Type: UNKNOWN HPSBUX02429 Source: CCN Type: RHSA-2009-0392 Critical: java-1.6.0-sun security update Source: CCN Type: RHSA-2009-1038 Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2009-1198 Critical: java-1.6.0-ibm security update Source: CCN Type: RHSA-2010-0043 Low: Red Hat Network Satellite Server IBM Java Runtime security update Source: CCN Type: SA34451 Sun Java JDK / JRE Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 34496 Source: SECUNIA Type: UNKNOWN 35156 Source: SECUNIA Type: UNKNOWN 35255 Source: SECUNIA Type: UNKNOWN 36185 Source: SECUNIA Type: UNKNOWN 37386 Source: CCN Type: SA37460 VMware Products Update for Multiple Packages Source: SECUNIA Type: UNKNOWN 37460 Source: GENTOO Type: UNKNOWN GLSA-200911-02 Source: CCN Type: SECTRACK ID: 1021920 Java Plug-in Bugs Lets Remote Users Gain Privileges Source: MISC Type: Patch http://sunsolve.sun.com/search/document.do?assetkey=1-21-125137-14-1 Source: CCN Type: Sun Alert ID: 254611 Multiple Security Vulnerabilities in Java Plug-in May Allow Privileges to be Escalated Source: SUNALERT Type: Patch, Vendor Advisory 254611 Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2009-108.htm Source: CCN Type: ASA-2009-108 java-1.6.0-sun security update (RHSA-2009-0392) Source: CCN Type: ASA-2009-125 Multiple Security Vulnerabilities in Java Plug-in May Allow Privileges to be Escalated (Sun 254611) Source: CCN Type: ASA-2009-182 java-1.5.0-ibm security update (RHSA-2009-1038) Source: REDHAT Type: UNKNOWN RHSA-2009:0392 Source: REDHAT Type: UNKNOWN RHSA-2009:1038 Source: BUGTRAQ Type: UNKNOWN 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components Source: BID Type: UNKNOWN 34240 Source: CCN Type: BID-34240 Sun Java Runtime Environment and Java Development Kit Multiple Security Vulnerabilities Source: SECTRACK Type: UNKNOWN 1021920 Source: CONFIRM Type: UNKNOWN http://www.vmware.com/security/advisories/VMSA-2009-0016.html Source: VUPEN Type: UNKNOWN ADV-2009-1426 Source: VUPEN Type: UNKNOWN ADV-2009-3316 Source: XF Type: UNKNOWN jre-plugin-crossdomain-info-disclosure(49459) Source: XF Type: UNKNOWN jre-plugin-crossdomain-info-disclosure(49459) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:6619 Source: REDHAT Type: UNKNOWN RHSA-2009:1198 Source: SUSE Type: SUSE-SA:2009:016 Sun Java Security Update Source: SUSE Type: SUSE-SA:2009:036 IBM Java 6 SR 5 update | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |