vendor:
Java JRE
by:
kf, jduck
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Java JRE
Affected Version From: 1.3.1_26
Affected Version To: 1.6.0_16
Patch Exists: YES
Related CWE: CVE-2009-3867
CPE: a:oracle:java:jre
Metasploit:
https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0002-3-java-jre-security-update-cve-2009-3867/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0005-cve-2009-3867/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2009-3867/, https://www.rapid7.com/db/vulnerabilities/apple-java-cve-2009-3867/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1643/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1647/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1694/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0408/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2009-3867/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-3867/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1560/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0043/
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=43597, https://www.infosecmatter.com/nessus-plugin-library/?id=42431, https://www.infosecmatter.com/nessus-plugin-library/?id=43079, https://www.infosecmatter.com/nessus-plugin-library/?id=43599, https://www.infosecmatter.com/nessus-plugin-library/?id=44029, https://www.infosecmatter.com/nessus-plugin-library/?id=43854, https://www.infosecmatter.com/nessus-plugin-library/?id=43872, https://www.infosecmatter.com/nessus-plugin-library/?id=43822, https://www.infosecmatter.com/nessus-plugin-library/?id=45386, https://www.infosecmatter.com/nessus-plugin-library/?id=42853
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3, Linux, Mac OS X
2009
Sun Java JRE getSoundbank file:// URI Buffer Overflow
This module exploits a flaw in the getSoundbank function in the Sun JVM. The payload is serialized and passed to the applet via PARAM tags. It must be a native payload. The effected Java versions are JDK and JRE 6 Update 16 and earlier, JDK and JRE 5.0 Update 21 and earlier, SDK and JRE 1.4.2_23 and earlier, and SDK and JRE 1.3.1_26 and earlier.
Mitigation:
Upgrade to the latest version of Java