// For flags

CVE-2009-1097

OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.

Múltiples desbordamientos de búfer en Java SE Development Kit (JDK) y Java Runtime Environment (JRE) versión 6 Update 12 y anteriores, permiten a los atacantes remotos acceder a archivos o ejecutar código arbitrario por medio de (1) una imagen PNG diseñada que desencadena un desbordamiento de enteros durante la asignación de memoria para su visualización en la pantalla de presentación, también se conoce como CR 6804996; y (2) una imagen GIF diseñada a partir de la cual se utilizan valores no especificados en el cálculo de desplazamientos, conllevando a una corrupción de puntero de objeto, también se conoce como CR 6804997.

It was discovered that font creation could leak temporary files. If a user were tricked into loading a malicious program or applet, a remote attacker could consume disk space, leading to a denial of service. It was discovered that the lightweight HttpServer did not correctly close files on dataless connections. A remote attacker could send specially crafted requests, leading to a denial of service. Certain 64bit Java actions would crash an application. A local attacker might be able to cause a denial of service. It was discovered that LDAP connections did not close correctly. A remote attacker could send specially crafted requests, leading to a denial of service. Java LDAP routines did not unserialize certain data correctly. A remote attacker could send specially crafted requests that could lead to arbitrary code execution. Java did not correctly check certain JAR headers. If a user or automated system were tricked into processing a malicious JAR file, a remote attacker could crash the application, leading to a denial of service. It was discovered that PNG and GIF decoding in Java could lead to memory corruption. If a user or automated system were tricked into processing a specially crafted image, a remote attacker could crash the application, leading to a denial of service.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-03-25 CVE Reserved
  • 2009-03-25 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-07-01 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (41)
URL Date SRC
URL Date SRC
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133 2018-10-10
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00001.html 2018-10-10
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00003.html 2018-10-10
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00001.html 2018-10-10
http://marc.info/?l=bugtraq&m=124344236532162&w=2 2018-10-10
http://secunia.com/advisories/34489 2018-10-10
http://secunia.com/advisories/34496 2018-10-10
http://secunia.com/advisories/34632 2018-10-10
http://secunia.com/advisories/34675 2018-10-10
http://secunia.com/advisories/35156 2018-10-10
http://secunia.com/advisories/35223 2018-10-10
http://secunia.com/advisories/35255 2018-10-10
http://secunia.com/advisories/35776 2018-10-10
http://secunia.com/advisories/36185 2018-10-10
http://secunia.com/advisories/37386 2018-10-10
http://secunia.com/advisories/37460 2018-10-10
http://security.gentoo.org/glsa/glsa-200911-02.xml 2018-10-10
http://www.debian.org/security/2009/dsa-1769 2018-10-10
http://www.mandriva.com/security/advisories?name=MDVSA-2009:137 2018-10-10
http://www.mandriva.com/security/advisories?name=MDVSA-2009:162 2018-10-10
http://www.redhat.com/support/errata/RHSA-2009-0392.html 2018-10-10
http://www.redhat.com/support/errata/RHSA-2009-1038.html 2018-10-10
http://www.ubuntu.com/usn/usn-748-1 2018-10-10
http://www.vupen.com/english/advisories/2009/1426 2018-10-10
http://www.vupen.com/english/advisories/2009/3316 2018-10-10
https://rhn.redhat.com/errata/RHSA-2009-0377.html 2018-10-10
https://rhn.redhat.com/errata/RHSA-2009-1198.html 2018-10-10
https://access.redhat.com/security/cve/CVE-2009-1097 2010-01-14
https://bugzilla.redhat.com/show_bug.cgi?id=490174 2010-01-14
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
<= 1.6.0
Search vendor "Sun" for product "Jdk" and version " <= 1.6.0"
update_12
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
-
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_10
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_11
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_3
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_4
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_5
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_6
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update_7
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update1
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update1_b06
Affected
Sun
Search vendor "Sun"
Jdk
Search vendor "Sun" for product "Jdk"
1.6.0
Search vendor "Sun" for product "Jdk" and version "1.6.0"
update2
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
<= 1.6.0
Search vendor "Sun" for product "Jre" and version " <= 1.6.0"
update_12
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
-
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_1
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_10
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_11
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_2
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_3
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_4
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_5
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_6
Affected
Sun
Search vendor "Sun"
Jre
Search vendor "Sun" for product "Jre"
1.6.0
Search vendor "Sun" for product "Jre" and version "1.6.0"
update_7
Affected