Vulnerability Name: | CVE-2009-2720 (CCN-53029) | ||||||||||||||||||||
Assigned: | 2009-08-10 | ||||||||||||||||||||
Published: | 2009-08-10 | ||||||||||||||||||||
Updated: | 2018-10-10 | ||||||||||||||||||||
Summary: | Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors. | ||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
1.4 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2009-2720 Source: CCN Type: Sun Microsystems Web site JDK 5.0u20 Release Notes Source: CONFIRM Type: Patch, Vendor Advisory http://java.sun.com/javase/6/webnotes/6u15.html Source: CCN Type: RHSA-2009-1199 Critical: java-1.5.0-sun security update Source: CCN Type: RHSA-2009-1200 Critical: java-1.6.0-sun security update Source: SECUNIA Type: UNKNOWN 37386 Source: CCN Type: SA37460 VMware Products Update for Multiple Packages Source: SECUNIA Type: UNKNOWN 37460 Source: GENTOO Type: UNKNOWN GLSA-200911-02 Source: BUGTRAQ Type: UNKNOWN 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components Source: CONFIRM Type: UNKNOWN http://www.vmware.com/security/advisories/VMSA-2009-0016.html Source: VUPEN Type: UNKNOWN ADV-2009-3316 Source: XF Type: UNKNOWN java-javaxswingplafsynthsynthcontext-dos(53029) | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |