Search for vulnerabilities
Vulnerability details: VCID-rdaw-ehy5-aaan
Vulnerability ID VCID-rdaw-ehy5-aaan
Aliases CVE-2009-3867
Summary CVE-2009-3867 java-1.5.0-sun, java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual MODERATE http://marc.info/?l=bugtraq&m=134254866602253&w=2
rhas Critical https://access.redhat.com/errata/RHSA-2009:1560
rhas Critical https://access.redhat.com/errata/RHSA-2009:1571
rhas Critical https://access.redhat.com/errata/RHSA-2009:1643
rhas Critical https://access.redhat.com/errata/RHSA-2009:1647
rhas Critical https://access.redhat.com/errata/RHSA-2009:1694
rhas Low https://access.redhat.com/errata/RHSA-2010:0043
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0408
epss 0.89029 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89029 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89029 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89029 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89029 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89029 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89029 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89134 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89134 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89347 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89347 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89347 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89347 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89347 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89347 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89347 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89347 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89445 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89445 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89445 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89445 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89445 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89445 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89471 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89471 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89471 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89567 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89567 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89567 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.89752 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.90028 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.90055 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.90055 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.90055 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.90055 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.90055 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.90443 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.92566 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93353 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93353 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93353 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93353 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93353 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93353 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93353 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93353 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93353 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93641 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93688 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
epss 0.93688 https://api.first.org/data/v1/epss?cve=CVE-2009-3867
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=533214
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2009-3867
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html
Reference id Reference type URL
http://java.sun.com/javase/6/webnotes/6u17.html
http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html
http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html
http://marc.info/?l=bugtraq&m=126566824131534&w=2
http://marc.info/?l=bugtraq&m=131593453929393&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3867.json
https://api.first.org/data/v1/epss?cve=CVE-2009-3867
http://secunia.com/advisories/37231
http://secunia.com/advisories/37239
http://secunia.com/advisories/37386
http://secunia.com/advisories/37581
http://secunia.com/advisories/37841
http://security.gentoo.org/glsa/glsa-200911-02.xml
http://securitytracker.com/id?1023132
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11903
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6746
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7750
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1
http://support.apple.com/kb/HT3969
http://support.apple.com/kb/HT3970
http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html
http://www.redhat.com/support/errata/RHSA-2009-1694.html
http://www.securityfocus.com/bid/36881
http://www.vupen.com/english/advisories/2009/3131
533214 https://bugzilla.redhat.com/show_bug.cgi?id=533214
cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
CVE-2009-3867 https://nvd.nist.gov/vuln/detail/CVE-2009-3867
CVE-2009-3867;OSVDB-59711 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33315.java
CVE-2009-3867;OSVDB-59711 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16294.rb
CVE-2009-3867;OSVDB-59711 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33316.java
CVE-2009-3867;OSVDB-59711 Exploit https://www.securityfocus.com/bid/36881/info
CVE-2009-3867;OSVDB-59711 Exploit http://zerodayinitiative.com/advisories/ZDI-09-076/
GLSA-200911-02 https://security.gentoo.org/glsa/200911-02
RHSA-2009:1560 https://access.redhat.com/errata/RHSA-2009:1560
RHSA-2009:1571 https://access.redhat.com/errata/RHSA-2009:1571
RHSA-2009:1643 https://access.redhat.com/errata/RHSA-2009:1643
RHSA-2009:1647 https://access.redhat.com/errata/RHSA-2009:1647
RHSA-2009:1694 https://access.redhat.com/errata/RHSA-2009:1694
RHSA-2010:0043 https://access.redhat.com/errata/RHSA-2010:0043
RHSA-2010:0408 https://access.redhat.com/errata/RHSA-2010:0408
Data source Exploit-DB
Date added Oct. 29, 2009
Description Sun Java SE November 2009 - Multiple Vulnerabilities (2)
Ransomware campaign use Known
Source publication date Oct. 29, 2009
Exploit type remote
Platform multiple
Source update date Dec. 18, 2016
Source URL https://www.securityfocus.com/bid/36881/info
Data source Metasploit
Description This module exploits a flaw in the getSoundbank function in the Sun JVM. The payload is serialized and passed to the applet via PARAM tags. It must be a native payload. The effected Java versions are JDK and JRE 6 Update 16 and earlier, JDK and JRE 5.0 Update 21 and earlier, SDK and JRE 1.4.2_23 and earlier, and SDK and JRE 1.3.1_26 and earlier. NOTE: Although all of the above versions are reportedly vulnerable, only 1.6.0_u11 and 1.6.0_u16 on Windows XP SP3 were tested.
Note
{}
Ransomware campaign use Unknown
Source publication date Nov. 4, 2009
Platform OSX,Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/java_getsoundbank_bof.rb
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2009-3867
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.9949
EPSS Score 0.89029
Published At May 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.