Unrated severityNVD Advisory· Published Nov 5, 2009· Updated Apr 23, 2026
CVE-2009-3867
CVE-2009-3867
Description
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
Affected products
204cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*+ 36 more
- cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*+ 101 more
- cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*+ 64 more
- cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
25- sunsolve.sun.com/search/document.donvdPatchVendor Advisory
- www.vupen.com/english/advisories/2009/3131nvdPatchVendor Advisory
- zerodayinitiative.com/advisories/ZDI-09-076/nvdPatch
- java.sun.com/javase/6/webnotes/6u17.htmlnvdVendor Advisory
- secunia.com/advisories/37231nvdVendor Advisory
- securitytracker.com/idnvdVendor Advisory
- lists.apple.com/archives/security-announce/2009/Dec/msg00000.htmlnvd
- lists.apple.com/archives/security-announce/2009/Dec/msg00001.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.htmlnvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- secunia.com/advisories/37239nvd
- secunia.com/advisories/37386nvd
- secunia.com/advisories/37581nvd
- secunia.com/advisories/37841nvd
- security.gentoo.org/glsa/glsa-200911-02.xmlnvd
- support.apple.com/kb/HT3969nvd
- support.apple.com/kb/HT3970nvd
- www.oracle.com/technetwork/topics/security/cpujan2010-084891.htmlnvd
- www.redhat.com/support/errata/RHSA-2009-1694.htmlnvd
- www.securityfocus.com/bid/36881nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11903nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6746nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7750nvd
News mentions
0No linked articles in our index yet.