CVE-2009-2475

N/A Unknown
Published: August 10, 2009 Modified: April 23, 2026
View on NVD

Description

Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/36162
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/36176
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/36180
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/36199
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37386
Source: secalert@redhat.com
http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1
Source: secalert@redhat.com
Patch Vendor Advisory
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://java.sun.com/javase/6/webnotes/6u15.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36162
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36176
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36180
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36199
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37386
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200911-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2009:209
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/2543
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=513215
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1199.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1200.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1201.html
Source: af854a3a-2127-422b-91ae-364da2661108

42 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.7%
72th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

sun