Vulnerability Description
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sun | Java Se | <= 6 |
| Sun | Openjdk | All versions |
Related Weaknesses (CWE)
References
- http://java.sun.com/javase/6/webnotes/6u15.htmlVendor Advisory
- http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
- http://secunia.com/advisories/36162Vendor Advisory
- http://secunia.com/advisories/36176Vendor Advisory
- http://secunia.com/advisories/36180Vendor Advisory
- http://secunia.com/advisories/37386
- http://security.gentoo.org/glsa/glsa-200911-02.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1PatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:209
- http://www.vupen.com/english/advisories/2009/2543
- https://bugzilla.redhat.com/show_bug.cgi?id=513220
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- https://rhn.redhat.com/errata/RHSA-2009-1200.html
- https://rhn.redhat.com/errata/RHSA-2009-1201.html
FAQ
What is CVE-2009-2476?
CVE-2009-2476 is a vulnerability with a CVSS score of 10.0 (HIGH). The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intend...
How severe is CVE-2009-2476?
CVE-2009-2476 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-2476?
Check the references section above for vendor advisories and patch information. Affected products include: Sun Java Se, Sun Openjdk.