CVE-2009-2690 – OpenJDK private variable information disclosure (6777487)
https://notcve.org/view.php?id=CVE-2009-2690
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application. The codificador en Sun Java SE v6 anteriores a Update 15, y OpenJDK, permite acceso de lectura a variables privadas con nombres no especificados, permitiendo a atacantes dependientes del contexto obtener información sensible mediante (1) un applet o (2) una aplicación no confiables. • http://java.sun.com/javase/6/webnotes/6u15.html http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html http://secunia.com/advisories/36162 http://secunia.com/advisories/36176 http://secunia.com/advisories/36180 http://secunia.com/advisories/37386 http://security.gentoo.org/glsa/glsa-200911-02.xml http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1 http://www.mandr • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-2476 – OpenJDK OpenType checks can be bypassed (6736293)
https://notcve.org/view.php?id=CVE-2009-2476
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object. La implementación de Java Management Extensions (JMX) en Sun Java SE v6 anteriores a Update 15, y en OpenJDK, no refuerza adecuadamente las validaciones OpenType, permitiendo a los atacantes dependientes del contexto saltar las restricciones de acceso previstas al aprovechar la re-ejecución de un método finalizador para obtener una referencia a un objeto privilegiado. • http://java.sun.com/javase/6/webnotes/6u15.html http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html http://secunia.com/advisories/36162 http://secunia.com/advisories/36176 http://secunia.com/advisories/36180 http://secunia.com/advisories/37386 http://security.gentoo.org/glsa/glsa-200911-02.xml http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1 http://www.mandr • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-2689 – OpenJDK JDK13Services grants unnecessary privileges (6777448)
https://notcve.org/view.php?id=CVE-2009-2689
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application. JDK13Services.getProviders en Sun Java SE v5.0 anteriores a Update 20 y v6 anteriores a Update 15, y en OpenJDK, proporciona privilegios completos a instancias de tipos de objeto no especificadas, permitiendo a atacantes dependientes del contexto saltar las restricciones de acceso previstas mediante (1)un applet o (2) una aplicación no confiables. • http://java.sun.com/j2se/1.5.0/ReleaseNotes.html http://java.sun.com/javase/6/webnotes/6u15.html http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html http://secunia.com/advisories/36162 http://secunia.com/advisories/36180 http://secunia.com/advisories/36199 http://secunia.com/advisories/37386 http://security.gentoo.org/glsa/glsa-200911-02.xml http://sunsolve.sun.com/search/do • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-1896
https://notcve.org/view.php?id=CVE-2009-1896
The Java Web Start framework in IcedTea in OpenJDK before 1.6.0.0-20.b16.fc10 on Fedora 10, and before 1.6.0.0-27.b16.fc11 on Fedora 11, trusts an entire application when at least one of the listed jar files is trusted, which allows context-dependent attackers to execute arbitrary code without the untrusted-code restrictions via a crafted application, related to NetX. La Java Web Start framework en IcedTea de OpenJDK en versiones anteriores a v1.6.0.0-20.b16.fc10 de Fedora 10, y anteriores a 1.6.0.0-27.b16.fc11 en Fedora 11, confía en toda una aplicación cuando al menos uno de los ficheros jar listados es confiable, lo que permite a atacantes depedientes del contexto ejecutar código de su elección sin restricciones de código no confiable a través de una aplicación modificada, relacionado con NetX. • http://secunia.com/advisories/36162 http://www.mandriva.com/security/advisories?name=MDVSA-2009:209 https://bugzilla.redhat.com/show_bug.cgi?id=512101 https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-0794
https://notcve.org/view.php?id=CVE-2009-0794
Integer overflow in the PulseAudioTargetDataL class in src/java/org/classpath/icedtea/pulseaudio/PulseAudioTargetDataLine.java in Pulse-Java, as used in OpenJDK 1.6.0.0 and other products, allows remote attackers to cause a denial of service (applet crash) via a crafted Pulse Audio source data line. Desbordamiento de entero en la clase PulseAudioTargetDataL de src/java/org/classpath/icedtea/pulseaudio/PulseAudioTargetDataLine.java de Pulse-Java, cuando es utilizado en OpenJDK v1.6.0.0 y otros productos, permite a usuarios remotos causar una denegación de servicio (caída del applet) a traves de una línea de datos fuente de Pulse Audio modificada. • http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2009-February/004729.html http://secunia.com/advisories/34623 http://www.mandriva.com/security/advisories?name=MDVSA-2009:137 http://www.mandriva.com/security/advisories?name=MDVSA-2009:162 http://www.vupen.com/english/advisories/2009/0965 https://bugzilla.redhat.com/show_bug.cgi?id=492367 https://exchange.xforce.ibmcloud.com/vulnerabilities/50383 https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00203.html https:/ • CWE-189: Numeric Errors •