The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.
2009-11-05T16:30:00.313
2025-04-09T00:30:58.490
Deferred
CVSSv2: 9.3 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |