Vulnerability Name: | CVE-2009-3886 (CCN-54226) |
Assigned: | 2009-11-03 |
Published: | 2009-11-03 |
Updated: | 2017-09-19 |
Summary: | The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-noinfo
|
Vulnerability Consequences: | Other |
References: | Source: MITRE Type: CNA CVE-2009-3886
Source: CCN Type: Sun Microsystems Web site Java SE 6 Release Notes
Source: CONFIRM Type: Vendor Advisory http://java.sun.com/javase/6/webnotes/6u17.html
Source: CCN Type: RHSA-2009-1560 Critical: java-1.6.0-sun security update
Source: SECUNIA Type: UNKNOWN 37386
Source: CCN Type: SA38438 VMware Products JRE Multiple Vulnerabilities
Source: GENTOO Type: UNKNOWN GLSA-200911-02
Source: CCN Type: OSVDB ID: 59923 Sun Java SE Java Web Start Implementation Signed JAR File JNLP Application / Applet Interaction Unspecified Issue
Source: CCN Type: Red Hat Bugzilla Bug 532914 CVE-2009-3886 JRE REGRESSION:have problem to run JNLP app and applets with signed Jar files (6870531)
Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=532914
Source: XF Type: UNKNOWN java-jar-jnlp-unspecified(54226)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:6794
|
Vulnerable Configuration: | Configuration 1: cpe:/a:sun:jre:1.6.0:update_1:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_10:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_11:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_12:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_13:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_14:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_15:*:*:*:*:*:*OR cpe:/a:sun:jre:*:update_16:*:*:*:*:*:* (Version <= 1.6.0)OR cpe:/a:sun:jre:1.6.0:update_2:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_3:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_4:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_5:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_6:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_7:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_8:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update_9:*:*:*:*:*:* Configuration RedHat 1: cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:sun:jre:1.6.0:update6:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update4:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update5:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update7:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update8:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update9:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update10:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update11:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update12:*:*:*:*:*:*OR cpe:/a:sun:jre:1.6.0:update13:*:*:*:*:*:*AND cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |