// For flags

CVE-2009-1097

OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.

Múltiples desbordamientos de búfer en Java SE Development Kit (JDK) y Java Runtime Environment (JRE) versión 6 Update 12 y anteriores, permiten a los atacantes remotos acceder a archivos o ejecutar código arbitrario por medio de (1) una imagen PNG diseñada que desencadena un desbordamiento de enteros durante la asignación de memoria para su visualización en la pantalla de presentación, también se conoce como CR 6804996; y (2) una imagen GIF diseñada a partir de la cual se utilizan valores no especificados en el cálculo de desplazamientos, conllevando a una corrupción de puntero de objeto, también se conoce como CR 6804997.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-03-25 CVE Reserved
  • 2009-03-25 CVE Published
  • 2023-09-23 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (41)
URL Date SRC
URL Date SRC
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133 2018-10-10
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00001.html 2018-10-10
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00003.html 2018-10-10
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00001.html 2018-10-10
http://marc.info/?l=bugtraq&m=124344236532162&w=2 2018-10-10
http://secunia.com/advisories/34489 2018-10-10
http://secunia.com/advisories/34496 2018-10-10
http://secunia.com/advisories/34632 2018-10-10
http://secunia.com/advisories/34675 2018-10-10
http://secunia.com/advisories/35156 2018-10-10
http://secunia.com/advisories/35223 2018-10-10
http://secunia.com/advisories/35255 2018-10-10
http://secunia.com/advisories/35776 2018-10-10
http://secunia.com/advisories/36185 2018-10-10
http://secunia.com/advisories/37386 2018-10-10
http://secunia.com/advisories/37460 2018-10-10
http://security.gentoo.org/glsa/glsa-200911-02.xml 2018-10-10
http://www.debian.org/security/2009/dsa-1769 2018-10-10
http://www.mandriva.com/security/advisories?name=MDVSA-2009:137 2018-10-10
http://www.mandriva.com/security/advisories?name=MDVSA-2009:162 2018-10-10
http://www.redhat.com/support/errata/RHSA-2009-0392.html 2018-10-10
http://www.redhat.com/support/errata/RHSA-2009-1038.html 2018-10-10
http://www.ubuntu.com/usn/usn-748-1 2018-10-10
http://www.vupen.com/english/advisories/2009/1426 2018-10-10
http://www.vupen.com/english/advisories/2009/3316 2018-10-10
https://rhn.redhat.com/errata/RHSA-2009-0377.html 2018-10-10
https://rhn.redhat.com/errata/RHSA-2009-1198.html 2018-10-10
https://access.redhat.com/security/cve/CVE-2009-1097 2010-01-14
https://bugzilla.redhat.com/show_bug.cgi?id=490174 2010-01-14
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
<= 1.6.0
Search vendor "Sun" for product "Jdk" and version " <= 1.6.0"
update_12
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
-
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_10
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_11
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_3
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_4
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_5
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_6
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_7
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update1
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update1_b06
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update2
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
<= 1.6.0
Search vendor "Sun" for product "Jre" and version " <= 1.6.0"
update_12
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
-
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_1
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_10
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_11
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_2
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_3
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_4
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_5
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_6
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_7
Affected