Vulnerability Name: | CVE-2009-3865 (CCN-54124) |
Assigned: | 2009-11-03 |
Published: | 2009-11-03 |
Updated: | 2018-10-30 |
Summary: | The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.
|
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-94
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2009-3865
Source: CONFIRM Type: UNKNOWN http://java.sun.com/javase/6/webnotes/6u17.html
Source: APPLE Type: UNKNOWN APPLE-SA-2009-12-03-1
Source: APPLE Type: UNKNOWN APPLE-SA-2009-12-03-2
Source: SUSE Type: UNKNOWN SUSE-SA:2009:058
Source: CCN Type: VMware Security Announcements Mailing list, Fri Jan 29 22:55:19 PST 2010 VMSA-2010-0002 VMware vCenter update release addresses multiple security issues in Java JRE
Source: HP Type: UNKNOWN HPSBMU02799
Source: CCN Type: RHSA-2009-1560 Critical: java-1.6.0-sun security update
Source: CCN Type: RHSA-2009-1694 Critical: java-1.6.0-ibm security update
Source: CCN Type: RHSA-2010-0043 Low: Red Hat Network Satellite Server IBM Java Runtime security update
Source: CCN Type: SA37231 Sun Java JDK / JRE Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 37231
Source: SECUNIA Type: UNKNOWN 37239
Source: SECUNIA Type: UNKNOWN 37386
Source: SECUNIA Type: UNKNOWN 37581
Source: CCN Type: SA37613 IBM Java Denial of Service Vulnerabilities
Source: CCN Type: SA37625 IBM Java 6 Denial of Service Vulnerabilities
Source: SECUNIA Type: UNKNOWN 37841
Source: CCN Type: SA38384 VMware VirtualCenter JRE Multiple Vulnerabilities
Source: GENTOO Type: UNKNOWN GLSA-200911-02
Source: CCN Type: SECTRACK ID: 1023244 Sun Java Runtime Environment Deployment Toolkit Plugin Launch Method Flaw Lets Remote Users Execute Arbitrary Code
Source: CCN Type: Sun Alert ID: 269869 Command Execution Vulnerability in the Java Runtime Environment Deployment Toolkit May be Leveraged to Execute Arbitrary Code
Source: SUNALERT Type: Patch, Vendor Advisory 269869
Source: CCN Type: Apple Web site About the security content of Java for Mac OS X 10.6 Update 1
Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT3969
Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT3970
Source: CCN Type: IBM Security Alerts Sun's latest Java security alerts
Source: CCN Type: OSVDB ID: 59717 Sun Java JDK / JRE Deployment Toolkit Web Page Handling Unspecified Arbitrary Code Execution
Source: REDHAT Type: UNKNOWN RHSA-2009:1694
Source: BID Type: Patch 36881
Source: CCN Type: BID-36881 Sun Java SE November 2009 Multiple Security Vulnerabilities
Source: SECTRACK Type: UNKNOWN 1023244
Source: VUPEN Type: Patch, Vendor Advisory ADV-2009-3131
Source: XF Type: UNKNOWN sun-jre-toolkit-code-execution(54124)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:7562
Source: SUSE Type: SUSE-SA:2009:058 Sun Java 6 security update
Source: SUSE Type: SUSE-SA:2010:004 IBM Java 6 security update
|
Vulnerable Configuration: | Configuration 1: cpe:/a:sun:jdk:1.6.0:update1:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update10:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update11:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update12:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update13:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update14:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update15:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update16:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update2:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update3:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update4:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update5:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update6:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update7:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update8:*:*:*:*:*:*OR cpe:/a:sun:jdk:1.6.0:update9:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update10:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update11:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update12:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update13:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update14:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update15:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update16:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update4:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update5:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update6:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update7:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update8:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update9:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_1:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_2:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_3:*:*:*:*:*:* Configuration RedHat 1: cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:sun:jre:6:*:*:*:*:*:*:*OR cpe:/a:ibm:java:1.4.2:*:*:*:*:*:*:*OR cpe:/a:ibm:java:5.0.0.0:*:*:*:*:*:*:*AND cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*OR cpe:/a:redhat:rhel_application_server:2:*:*:*:*:*:*:*OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*OR cpe:/a:vmware:virtualcenter:2.0:unknown:client:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |