Skip to navigation

CVE Database

CVE-2009-2475

Impact: Low
Public: 2009-08-05
Bugzilla: 513215: CVE-2009-2475 OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)

Details

The MITRE CVE dictionary describes this issue as:

Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.

Find out more about CVE-2009-2475 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 5.8
Base Metrics: AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector: Network
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux Server Supplementary (v. 5) (java-1.5.0-sun) RHSA-2009:1199 August 06, 2009
Red Hat Enterprise Linux Server Supplementary (v. 5) (java-1.6.0-sun) RHSA-2009:1200 August 06, 2009
Red Hat Enterprise Linux version 4 Extras (java-1.5.0-sun) RHSA-2009:1199 August 06, 2009
Red Hat Enterprise Linux version 4 Extras (java-1.6.0-sun) RHSA-2009:1200 August 06, 2009
Red Hat Enterprise Linux version 5 (java-1.6.0-openjdk) RHSA-2009:1201 August 06, 2009
Red Hat Satellite 5.1 (RHEL v.4 AS) (java-1.5.0-sun) RHSA-2009:1662 December 11, 2009

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.