ID CVE-2009-3879
Summary Multiple unspecified vulnerabilities in the (1) X11 and (2) Win32GraphicsDevice subsystems in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and attack vectors, related to failure to clone arrays that are returned by the getConfigurations function, aka Bug Id 6822057.
References
Vulnerable Configurations
  • cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
  • cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*
    cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 19-09-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
  • accepted 2014-01-20T04:01:35.771-05:00
    class vulnerability
    contributors
    • name J. Daniel Brown
      organization DTCC
    • name Chris Coffin
      organization The MITRE Corporation
    definition_extensions
    comment VMware ESX Server 4.0 is installed
    oval oval:org.mitre.oval:def:6293
    description Multiple unspecified vulnerabilities in the (1) X11 and (2) Win32GraphicsDevice subsystems in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and attack vectors, related to failure to clone arrays that are returned by the getConfigurations function, aka Bug Id 6822057.
    family unix
    id oval:org.mitre.oval:def:7545
    status accepted
    submitted 2010-06-01T17:30:00.000-05:00
    title OpenJDK GraphicsConfiguration Information Leak
    version 8
  • accepted 2013-04-29T04:20:19.900-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description Multiple unspecified vulnerabilities in the (1) X11 and (2) Win32GraphicsDevice subsystems in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and attack vectors, related to failure to clone arrays that are returned by the getConfigurations function, aka Bug Id 6822057.
    family unix
    id oval:org.mitre.oval:def:9568
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Multiple unspecified vulnerabilities in the (1) X11 and (2) Win32GraphicsDevice subsystems in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and attack vectors, related to failure to clone arrays that are returned by the getConfigurations function, aka Bug Id 6822057.
    version 18
redhat via4
rpms
  • java-1.6.0-sun-1:1.6.0.17-1jpp.1.el4
  • java-1.6.0-sun-1:1.6.0.17-1jpp.2.el5
  • java-1.6.0-sun-demo-1:1.6.0.17-1jpp.1.el4
  • java-1.6.0-sun-demo-1:1.6.0.17-1jpp.2.el5
  • java-1.6.0-sun-devel-1:1.6.0.17-1jpp.1.el4
  • java-1.6.0-sun-devel-1:1.6.0.17-1jpp.2.el5
  • java-1.6.0-sun-jdbc-1:1.6.0.17-1jpp.1.el4
  • java-1.6.0-sun-jdbc-1:1.6.0.17-1jpp.2.el5
  • java-1.6.0-sun-plugin-1:1.6.0.17-1jpp.1.el4
  • java-1.6.0-sun-plugin-1:1.6.0.17-1jpp.2.el5
  • java-1.6.0-sun-src-1:1.6.0.17-1jpp.1.el4
  • java-1.6.0-sun-src-1:1.6.0.17-1jpp.2.el5
  • java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4
  • java-1.5.0-sun-0:1.5.0.22-1jpp.1.el5
  • java-1.5.0-sun-demo-0:1.5.0.22-1jpp.1.el4
  • java-1.5.0-sun-demo-0:1.5.0.22-1jpp.1.el5
  • java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4
  • java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el5
  • java-1.5.0-sun-jdbc-0:1.5.0.22-1jpp.1.el4
  • java-1.5.0-sun-jdbc-0:1.5.0.22-1jpp.1.el5
  • java-1.5.0-sun-plugin-0:1.5.0.22-1jpp.1.el4
  • java-1.5.0-sun-plugin-0:1.5.0.22-1jpp.1.el5
  • java-1.5.0-sun-src-0:1.5.0.22-1jpp.1.el4
  • java-1.5.0-sun-src-0:1.5.0.22-1jpp.1.el5
  • java-1.6.0-openjdk-1:1.6.0.0-1.7.b09.el5
  • java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.7.b09.el5
  • java-1.6.0-openjdk-demo-1:1.6.0.0-1.7.b09.el5
  • java-1.6.0-openjdk-devel-1:1.6.0.0-1.7.b09.el5
  • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.7.b09.el5
  • java-1.6.0-openjdk-src-1:1.6.0.0-1.7.b09.el5
  • java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4
  • java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4
refmap via4
confirm
gentoo GLSA-200911-02
mandriva MDVSA-2010:084
secunia 37386
Last major update 19-09-2017 - 01:29
Published 09-11-2009 - 19:30
Last modified 19-09-2017 - 01:29
Back to Top