Unrated severityNVD Advisory· Published Mar 25, 2009· Updated Apr 23, 2026
CVE-2009-1099
CVE-2009-1099
Description
Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
Affected products
3cpe:2.3:a:sun:java_runtime_environment:5.0:*:17:*:*:*:*:*+ 1 more
- cpe:2.3:a:sun:java_runtime_environment:5.0:*:17:*:*:*:*:*
- cpe:2.3:a:sun:java_runtime_environment:6.0:*:12:*:*:*:*:*
- cpe:2.3:a:sun:java_se_development_kit:*:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
34- sunsolve.sun.com/search/document.donvdPatchVendor Advisory
- sunsolve.sun.com/search/document.donvdPatchVendor Advisory
- secunia.com/advisories/34495nvdVendor Advisory
- secunia.com/advisories/34496nvdVendor Advisory
- secunia.com/advisories/35156nvdVendor Advisory
- secunia.com/advisories/35223nvdVendor Advisory
- secunia.com/advisories/35255nvdVendor Advisory
- secunia.com/advisories/35416nvdVendor Advisory
- secunia.com/advisories/35776nvdVendor Advisory
- secunia.com/advisories/36185nvdVendor Advisory
- secunia.com/advisories/37386nvdVendor Advisory
- secunia.com/advisories/37460nvdVendor Advisory
- www.vupen.com/english/advisories/2009/1426nvdVendor Advisory
- www.vupen.com/english/advisories/2009/3316nvdVendor Advisory
- h20000.www2.hp.com/bizsupport/TechSupport/Document.jspnvd
- labs.idefense.com/intelligence/vulnerabilities/display.phpnvd
- lists.opensuse.org/opensuse-security-announce/2009-04/msg00001.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2009-05/msg00003.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2009-07/msg00001.htmlnvd
- marc.infonvd
- security.gentoo.org/glsa/glsa-200911-02.xmlnvd
- support.avaya.com/elmodocs2/security/ASA-2009-108.htmnvd
- support.avaya.com/elmodocs2/security/ASA-2009-109.htmnvd
- www.oracle.com/technetwork/topics/security/cpujul2009-091332.htmlnvd
- www.redhat.com/support/errata/RHSA-2009-0392.htmlnvd
- www.redhat.com/support/errata/RHSA-2009-0394.htmlnvd
- www.redhat.com/support/errata/RHSA-2009-1038.htmlnvd
- www.securityfocus.com/archive/1/507985/100/0/threadednvd
- www.securityfocus.com/bid/34240nvd
- www.securitytracker.com/idnvd
- www.vmware.com/security/advisories/VMSA-2009-0016.htmlnvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5726nvd
- rhn.redhat.com/errata/RHSA-2009-1198.htmlnvd
News mentions
0No linked articles in our index yet.