Search for vulnerabilities
Vulnerability ID | VCID-9rjq-bbm6-aaab |
Aliases |
CVE-2009-3869
|
Summary | CVE-2009-3869 OpenJDK JRE AWT setDifflCM stack overflow (6872357) |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 9.0 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
Data source | Exploit-DB |
---|---|
Date added | Sept. 20, 2010 |
Description | Sun Java - JRE AWT setDiffICM Buffer Overflow (Metasploit) |
Ransomware campaign use | Known |
Source publication date | Sept. 20, 2010 |
Exploit type | remote |
Platform | multiple |
Source update date | March 7, 2011 |
Source URL | http://www.zerodayinitiative.com/advisories/ZDI-09-078/ |
Data source | Metasploit |
---|---|
Description | This module exploits a flaw in the setDiffICM function in the Sun JVM. The payload is serialized and passed to the applet via PARAM tags. It must be a native payload. The effected Java versions are JDK and JRE 6 Update 16 and earlier, JDK and JRE 5.0 Update 21 and earlier, SDK and JRE 1.4.2_23 and earlier, and SDK and JRE 1.3.1_26 and earlier. NOTE: Although all of the above versions are reportedly vulnerable, only 1.6.0_u11 and 1.6.0_u16 on Windows XP SP3 were tested. |
Note | {} |
Ransomware campaign use | Unknown |
Source publication date | Nov. 4, 2009 |
Platform | OSX,Windows |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/java_setdifficm_bof.rb |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.98966 |
EPSS Score | 0.78483 |
Published At | June 14, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |