CVE-2009-3867

EXPLOITED

Sun Java JRE getSoundbank file:// URI Buffer Overflow

Title source: metasploit

Description

Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/16294
exploitdb WORKING POC VERIFIED
by Tometzky · javaremotemultiple
https://www.exploit-db.com/exploits/33316
exploitdb WORKING POC VERIFIED
by Tometzky · javaremotelinux
https://www.exploit-db.com/exploits/33315
metasploit WORKING POC GREAT
by kf, jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/java_getsoundbank_bof.rb

References (25)

... and 5 more

Scores

EPSS 0.8914
EPSS Percentile 99.5%

Details

VulnCheck KEV 2010-05-01
CWE
CWE-119
Status published
Products (3)
sun/jdk 1.5.0 update_1 (21 CPE variants)
sun/jdk 1.6.0 update_1 (16 CPE variants)
sun/jre 1.5.0 update_1 (13 CPE variants)
Published Nov 05, 2009
Tracked Since Feb 18, 2026