2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-3866" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-11-05T16:30:00.313" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:08:22.160" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824."
} ,
{
"lang" : "es" ,
"value" : "Java Web Start Installer en Sun Java SE en JDK y JRE 6 anteriores a Update 17 no usa adecuadamente los permisos del modelo de seguridad cuando borra las extensiones del instalador, lo que permite a los atacantes remotos ejecutar arbitrariamente c\u00f3digo modificando ciertos archivos JNLP que tienen un campo URL que apunta a una aplicaci\u00f3n no confiable, tambi\u00e9n conocido como Bug Id 6872824."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 9.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*" ,
"matchCriteriaId" : "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*" ,
"matchCriteriaId" : "722A93D8-B5BC-42F3-92A2-E424F61269A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*" ,
"matchCriteriaId" : "775F2611-F11C-4B84-8F40-0D034B81BF18"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*" ,
"matchCriteriaId" : "F20FDD9F-FF45-48BC-9207-54FB02E76071"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*" ,
"matchCriteriaId" : "9FA326F5-894A-4B01-BCA3-B126DA81CA59"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*" ,
"matchCriteriaId" : "228AB7B4-4BA4-43D4-B562-D438884DB152"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*" ,
"matchCriteriaId" : "AFD5C688-2103-4D60-979E-D9BE69A989C3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*" ,
"matchCriteriaId" : "21421215-F722-4207-A2E5-E2DF4B29859B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*" ,
"matchCriteriaId" : "D98175BF-B084-4FA5-899D-9E80DC3923EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*" ,
"matchCriteriaId" : "820632CE-F8DF-47EE-B716-7530E60008B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*" ,
"matchCriteriaId" : "D54AB785-E9B7-47BD-B756-0C3A629D67DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9412098-0353-4F7B-9245-010557E6C651"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB0E9224-3D12-47E2-8E69-7B682284CDDD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*" ,
"matchCriteriaId" : "77BCD102-59A4-45A6-ADEF-CAB7F70E2377"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*" ,
"matchCriteriaId" : "09027C19-D442-446F-B7A8-21DB6787CF43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A0FEC28-0707-4F42-9740-78F3D2D551EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*" ,
"matchCriteriaId" : "C3C5879A-A608-4230-9DC1-C27F0F48A13B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*" ,
"matchCriteriaId" : "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*" ,
"matchCriteriaId" : "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*" ,
"matchCriteriaId" : "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*" ,
"matchCriteriaId" : "AADBB4F9-E43E-428B-9979-F47A15696C85"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*" ,
"matchCriteriaId" : "7158D2C0-E9AC-4CD6-B777-EA7B7A181997"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*" ,
"matchCriteriaId" : "90EC6C13-4B37-48E5-8199-A702A944D5A6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*" ,
"matchCriteriaId" : "2528152C-E20A-4D97-931C-A5EC3CEAA06D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*" ,
"matchCriteriaId" : "A99DAB4C-272B-4C91-BC70-7729E1152590"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*" ,
"matchCriteriaId" : "30DFC10A-A4D9-4F89-B17C-AB9260087D29"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*" ,
"matchCriteriaId" : "272A5C44-18EC-41A9-8233-E9D4D0734EA6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*" ,
"matchCriteriaId" : "3DA21490-E253-4BDC-9BA8-5D068BE35189"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*" ,
"matchCriteriaId" : "81C2C04D-D4BA-4C87-9609-C53AA63BFF19"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://java.sun.com/javase/6/webnotes/6u17.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/37231" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/37239" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/37386" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/37581" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/37841" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://security.gentoo.org/glsa/glsa-200911-02.xml" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269870-1" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://support.apple.com/kb/HT3969" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://support.apple.com/kb/HT3970" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1694.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/36881" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/3131" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://zerodayinitiative.com/advisories/ZDI-09-077/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6635" ,
"source" : "cve@mitre.org"
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://java.sun.com/javase/6/webnotes/6u17.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/37231" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/37239" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/37386" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/37581" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/37841" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://security.gentoo.org/glsa/glsa-200911-02.xml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269870-1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://support.apple.com/kb/HT3969" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://support.apple.com/kb/HT3970" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1694.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/36881" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/3131" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://zerodayinitiative.com/advisories/ZDI-09-077/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6635" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}