// For flags

CVE-2009-1099

OpenJDK: Type1 font processing buffer overflow vulnerability

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.

Un error de firma de enteros en Java SE Development Kit (JDK) y Java Runtime Environment (JRE) versiones 5.0 Update 17 y anteriores, y versiones 6 Update 12 y anteriores, permite a los atacantes remotos acceder a archivos o ejecutar código arbitrario por medio de descripciones de glifos diseñados en una fuente Type1, lo que omite una comparación firmada y desencadena un desbordamiento de búfer.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-03-25 CVE Reserved
  • 2009-03-25 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-28 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
CAPEC
References (36)
URL Date SRC
URL Date SRC
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133 2018-10-10
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00001.html 2018-10-10
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00003.html 2018-10-10
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html 2018-10-10
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00001.html 2018-10-10
http://marc.info/?l=bugtraq&m=124344236532162&w=2 2018-10-10
http://secunia.com/advisories/34495 2018-10-10
http://secunia.com/advisories/34496 2018-10-10
http://secunia.com/advisories/35156 2018-10-10
http://secunia.com/advisories/35223 2018-10-10
http://secunia.com/advisories/35255 2018-10-10
http://secunia.com/advisories/35416 2018-10-10
http://secunia.com/advisories/35776 2018-10-10
http://secunia.com/advisories/36185 2018-10-10
http://secunia.com/advisories/37386 2018-10-10
http://secunia.com/advisories/37460 2018-10-10
http://security.gentoo.org/glsa/glsa-200911-02.xml 2018-10-10
http://www.redhat.com/support/errata/RHSA-2009-0392.html 2018-10-10
http://www.redhat.com/support/errata/RHSA-2009-0394.html 2018-10-10
http://www.redhat.com/support/errata/RHSA-2009-1038.html 2018-10-10
http://www.vupen.com/english/advisories/2009/1426 2018-10-10
http://www.vupen.com/english/advisories/2009/3316 2018-10-10
https://rhn.redhat.com/errata/RHSA-2009-1198.html 2018-10-10
https://access.redhat.com/security/cve/CVE-2009-1099 2010-01-14
https://bugzilla.redhat.com/show_bug.cgi?id=492302 2010-01-14
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sun
Search vendor "Sun"
Java Runtime Environment
Search vendor "Sun" for product "Java Runtime Environment"
5.0
Search vendor "Sun" for product "Java Runtime Environment" and version "5.0"
17
Affected
Sun
Search vendor "Sun"
Java Runtime Environment
Search vendor "Sun" for product "Java Runtime Environment"
6.0
Search vendor "Sun" for product "Java Runtime Environment" and version "6.0"
12
Affected
Sun
Search vendor "Sun"
Java Se Development Kit
Search vendor "Sun" for product "Java Se Development Kit"
*-
Affected