Search for vulnerabilities
Vulnerability details: VCID-9rjq-bbm6-aaab
Vulnerability ID VCID-9rjq-bbm6-aaab
Aliases CVE-2009-3869
Summary CVE-2009-3869 OpenJDK JRE AWT setDifflCM stack overflow (6872357)
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual MODERATE http://marc.info/?l=bugtraq&m=134254866602253&w=2
rhas Critical https://access.redhat.com/errata/RHSA-2009:1560
rhas Critical https://access.redhat.com/errata/RHSA-2009:1571
rhas Important https://access.redhat.com/errata/RHSA-2009:1584
rhas Critical https://access.redhat.com/errata/RHSA-2009:1643
rhas Critical https://access.redhat.com/errata/RHSA-2009:1647
rhas Critical https://access.redhat.com/errata/RHSA-2009:1694
rhas Low https://access.redhat.com/errata/RHSA-2010:0043
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0408
epss 0.78483 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.78483 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.78483 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.78483 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.78483 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.78483 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.78483 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85063 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.85993 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.92566 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.93688 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.93688 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.94602 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.94602 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.94602 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.94602 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.94602 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.94602 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.94602 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.94602 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.94602 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
epss 0.94801 https://api.first.org/data/v1/epss?cve=CVE-2009-3869
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=530062
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2009-3869
generic_textual MODERATE http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html
Reference id Reference type URL
http://java.sun.com/javase/6/webnotes/6u17.html
http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html
http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html
http://marc.info/?l=bugtraq&m=126566824131534&w=2
http://marc.info/?l=bugtraq&m=131593453929393&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3869.json
https://api.first.org/data/v1/epss?cve=CVE-2009-3869
http://secunia.com/advisories/37231
http://secunia.com/advisories/37239
http://secunia.com/advisories/37386
http://secunia.com/advisories/37581
http://secunia.com/advisories/37841
http://security.gentoo.org/glsa/glsa-200911-02.xml
http://securitytracker.com/id?1023132
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10741
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11262
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7400
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8566
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1
http://support.apple.com/kb/HT3969
http://support.apple.com/kb/HT3970
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html
http://www.redhat.com/support/errata/RHSA-2009-1694.html
http://www.securityfocus.com/bid/36881
http://www.vupen.com/english/advisories/2009/3131
http://zerodayinitiative.com/advisories/ZDI-09-078/
530062 https://bugzilla.redhat.com/show_bug.cgi?id=530062
cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
CVE-2009-3869 https://nvd.nist.gov/vuln/detail/CVE-2009-3869
CVE-2009-3869;OSVDB-59710 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16298.rb
CVE-2009-3869;OSVDB-59710 Exploit http://www.zerodayinitiative.com/advisories/ZDI-09-078/
GLSA-200911-02 https://security.gentoo.org/glsa/200911-02
RHSA-2009:1560 https://access.redhat.com/errata/RHSA-2009:1560
RHSA-2009:1571 https://access.redhat.com/errata/RHSA-2009:1571
RHSA-2009:1584 https://access.redhat.com/errata/RHSA-2009:1584
RHSA-2009:1643 https://access.redhat.com/errata/RHSA-2009:1643
RHSA-2009:1647 https://access.redhat.com/errata/RHSA-2009:1647
RHSA-2009:1694 https://access.redhat.com/errata/RHSA-2009:1694
RHSA-2010:0043 https://access.redhat.com/errata/RHSA-2010:0043
RHSA-2010:0408 https://access.redhat.com/errata/RHSA-2010:0408
USN-859-1 https://usn.ubuntu.com/859-1/
Data source Exploit-DB
Date added Sept. 20, 2010
Description Sun Java - JRE AWT setDiffICM Buffer Overflow (Metasploit)
Ransomware campaign use Known
Source publication date Sept. 20, 2010
Exploit type remote
Platform multiple
Source update date March 7, 2011
Source URL http://www.zerodayinitiative.com/advisories/ZDI-09-078/
Data source Metasploit
Description This module exploits a flaw in the setDiffICM function in the Sun JVM. The payload is serialized and passed to the applet via PARAM tags. It must be a native payload. The effected Java versions are JDK and JRE 6 Update 16 and earlier, JDK and JRE 5.0 Update 21 and earlier, SDK and JRE 1.4.2_23 and earlier, and SDK and JRE 1.3.1_26 and earlier. NOTE: Although all of the above versions are reportedly vulnerable, only 1.6.0_u11 and 1.6.0_u16 on Windows XP SP3 were tested.
Note
{}
Ransomware campaign use Unknown
Source publication date Nov. 4, 2009
Platform OSX,Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/java_setdifficm_bof.rb
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2009-3869
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.98966
EPSS Score 0.78483
Published At June 14, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.