Unrated severityNVD Advisory· Published Mar 25, 2009· Updated Apr 23, 2026
CVE-2009-1097
CVE-2009-1097
Description
Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.
Affected products
23cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*+ 11 more
- cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:*:update_12:*:*:*:*:*:*range: <=1.6.0
cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*+ 10 more
- cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:*:update_12:*:*:*:*:*:*range: <=1.6.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
39- sunsolve.sun.com/search/document.donvdPatchVendor Advisory
- secunia.com/advisories/34489nvdVendor Advisory
- secunia.com/advisories/34496nvdVendor Advisory
- secunia.com/advisories/34632nvdVendor Advisory
- secunia.com/advisories/34675nvdVendor Advisory
- secunia.com/advisories/35156nvdVendor Advisory
- secunia.com/advisories/35223nvdVendor Advisory
- secunia.com/advisories/35255nvdVendor Advisory
- secunia.com/advisories/35776nvdVendor Advisory
- secunia.com/advisories/36185nvdVendor Advisory
- secunia.com/advisories/37386nvdVendor Advisory
- secunia.com/advisories/37460nvdVendor Advisory
- www.vupen.com/english/advisories/2009/1426nvdVendor Advisory
- www.vupen.com/english/advisories/2009/3316nvdVendor Advisory
- h20000.www2.hp.com/bizsupport/TechSupport/Document.jspnvd
- labs.idefense.com/intelligence/vulnerabilities/display.phpnvd
- labs.idefense.com/intelligence/vulnerabilities/display.phpnvd
- lists.opensuse.org/opensuse-security-announce/2009-04/msg00001.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2009-05/msg00003.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2009-07/msg00001.htmlnvd
- marc.infonvd
- security.gentoo.org/glsa/glsa-200911-02.xmlnvd
- support.avaya.com/elmodocs2/security/ASA-2009-108.htmnvd
- www.debian.org/security/2009/dsa-1769nvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.oracle.com/technetwork/topics/security/cpujul2009-091332.htmlnvd
- www.redhat.com/support/errata/RHSA-2009-0392.htmlnvd
- www.redhat.com/support/errata/RHSA-2009-1038.htmlnvd
- www.securityfocus.com/archive/1/507985/100/0/threadednvd
- www.securityfocus.com/bid/34240nvd
- www.securitytracker.com/idnvd
- www.ubuntu.com/usn/usn-748-1nvd
- www.vmware.com/security/advisories/VMSA-2009-0016.htmlnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/49475nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11241nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6288nvd
- rhn.redhat.com/errata/RHSA-2009-0377.htmlnvd
- rhn.redhat.com/errata/RHSA-2009-1198.htmlnvd
News mentions
0No linked articles in our index yet.