CVE-2009-2675

N/A Unknown
Published: August 05, 2009 Modified: April 23, 2026
View on NVD

Description

Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/36162
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36176
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36180
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36199
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36248
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/37300
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/37386
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/37460
Source: cve@mitre.org
Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA09-294A.html
Source: cve@mitre.org
US Government Resource
http://www.vupen.com/english/advisories/2009/2543
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3316
Source: cve@mitre.org
Vendor Advisory
http://marc.info/?l=bugtraq&m=125787273209737&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36162
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36176
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36180
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36199
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36248
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37300
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37386
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37460
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200911-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263488-1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:209
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA09-294A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/2543
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3316
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-09-049/
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/52307
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1199.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1200.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1201.html
Source: af854a3a-2127-422b-91ae-364da2661108

66 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
6.8%
91th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

sun