2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-2205" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-09-09T22:30:00.217" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T01:04:23.013" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Stack-based buffer overflow in the Java Web Start command launcher in Java for Mac OS X 10.5 before Update 5 allows attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors."
} ,
{
"lang" : "es" ,
"value" : "Desbordamiento de b\u00fafer basado en pila en el Java Web Start Command Launcher en Java para Mac OS X v10.5 anterior a la actualizaci\u00f3n 5, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de vectores no especificados."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2442D35-7484-43D8-9077-3FDF63104816"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DC90AA12-DD17-4607-90CB-E342E83F20BB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F3E721C-00CA-4D51-B542-F2BC5C0D65BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B3267A41-1AE0-48B8-BD1F-DEC8A212851A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.5.2:2008-002:*:*:*:*:*:*" ,
"matchCriteriaId" : "0DA315DB-10DF-4D18-A575-37A70F9AFD3F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "855288F1-0242-4951-AB3F-B7AF13E21CF6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10082781-B93E-4B84-94F2-FA9749B4D92B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE1EBF04-C440-4A6B-93F2-DC3A812728C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DFB077A2-927B-43AF-BFD5-0E78648C9394"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2398ADC8-A106-462E-B9AE-F8AF800D0A3C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "20E8648C-5469-4280-A581-D4A9A41B7213"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C7817232-BE3E-4655-8282-A979E5D40D3D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "77E8D614-E1EE-42F1-9E55-EA54FB500621"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C73BED9E-29FB-4965-B38F-013FFE5A9170"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3B7DEC3-1C0B-4D13-98CD-CB7FAE7933B0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7723A9E8-1DE2-4C7D-81E6-4F79DCB09324"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C147E866-B80F-4FFA-BBE8-19E84A46DB1C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8EC681A4-6F58-4C7D-B4E0-FCC1BCBC534E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ADF94705-562C-4EC8-993E-1AD88F01549C"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:java_1.4:*:21:*:*:*:*:*:*" ,
"versionEndIncluding" : "2" ,
"matchCriteriaId" : "CA48B4BD-D73D-406E-A2CB-40AFD586A6E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:java_1.4:2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D939C2B-44CB-4FFF-A3A1-AE34CF5EEC9E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:java_1.4:2:16:*:*:*:*:*:*" ,
"matchCriteriaId" : "C456DD9A-A666-4F58-A62E-31783674B0D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:java_1.4:2:18:*:*:*:*:*:*" ,
"matchCriteriaId" : "E5B0BBE8-D809-47D4-BE97-89DC01AAA9A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:java_1.5:*:19:*:*:*:*:*:*" ,
"versionEndIncluding" : "0" ,
"matchCriteriaId" : "3BC5B357-2264-4E59-BB14-8FEFD6BC5F1E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:java_1.6:*:13:*:*:*:*:*:*" ,
"versionEndIncluding" : "0" ,
"matchCriteriaId" : "B7F07B54-7C97-46EF-8D6E-6DF25E01344C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:java_1.6:0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3921FB86-2E5A-4756-B59F-0F093B28590A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:java_1.6:0:05:*:*:*:*:*:*" ,
"matchCriteriaId" : "750853B2-5D03-48D2-A6A8-6084312D1C2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:java_1.6:0:07:*:*:*:*:*:*" ,
"matchCriteriaId" : "E286B78C-E651-483F-8778-DE22A5197C91"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://securitytracker.com/id?1022820" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/2543" ,
"source" : "cve@mitre.org"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://securitytracker.com/id?1022820" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/2543" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}