CWE
NVD-CWE-Other
Advisory Published
CVE Published
CVE Published
Updated

CVE-2009-2625

First published: Tue Jul 21 2009(Updated: )

Sun Java Runtime Environment (JRE) is vulnerable to a denial of service, caused by an error in Apache Xerces2 Java. A remote attacker could exploit this vulnerability using specially-crafted XML input, to cause the application to enter into an infinite loop and hang.

Credit: cret@cert.org

Affected SoftwareAffected VersionHow to fix
redhat/java<1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3
1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3
redhat/java<1.5.0-sun-0:1.5.0.20-1jpp.1.el4
1.5.0-sun-0:1.5.0.20-1jpp.1.el4
redhat/java<1.6.0-sun-1:1.6.0.15-1jpp.1.el4
1.6.0-sun-1:1.6.0.15-1jpp.1.el4
redhat/java<1.5.0-ibm-1:1.5.0.10-1jpp.4.el4
1.5.0-ibm-1:1.5.0.10-1jpp.4.el4
redhat/java<1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4
1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4
redhat/java<1.6.0-ibm-1:1.6.0.6-1jpp.3.el4
1.6.0-ibm-1:1.6.0.6-1jpp.3.el4
redhat/glassfish-javamail<0:1.4.2-0jpp.ep1.5.el4
0:1.4.2-0jpp.ep1.5.el4
redhat/glassfish-jsf<0:1.2_13-2.1.ep1.el4
0:1.2_13-2.1.ep1.el4
redhat/hibernate3<1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4
1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4
redhat/hibernate3-annotations<0:3.3.1-1.11.GA_CP02.ep1.el4
0:3.3.1-1.11.GA_CP02.ep1.el4
redhat/hibernate3-entitymanager<0:3.3.2-2.5.GA_CP01.ep1.el4
0:3.3.2-2.5.GA_CP01.ep1.el4
redhat/jacorb<0:2.3.0-1jpp.ep1.9.el4
0:2.3.0-1jpp.ep1.9.el4
redhat/jakarta-commons-logging-jboss<0:1.1-9.ep1.el4
0:1.1-9.ep1.el4
redhat/jboss-aop<0:1.5.5-3.CP04.2.ep1.el4
0:1.5.5-3.CP04.2.ep1.el4
redhat/jbossas<0:4.2.0-5.GA_CP08.5.ep1.el4
0:4.2.0-5.GA_CP08.5.ep1.el4
redhat/jboss-common<0:1.2.1-0jpp.ep1.3.el4
0:1.2.1-0jpp.ep1.3.el4
redhat/jboss-remoting<0:2.2.3-3.SP1.ep1.el4
0:2.2.3-3.SP1.ep1.el4
redhat/jboss-seam<0:1.2.1-1.ep1.22.el4
0:1.2.1-1.ep1.22.el4
redhat/jbossts<1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4
1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4
redhat/jbossweb<0:2.0.0-6.CP12.0jpp.ep1.2.el4
0:2.0.0-6.CP12.0jpp.ep1.2.el4
redhat/jcommon<0:1.0.16-1.1.ep1.el4
0:1.0.16-1.1.ep1.el4
redhat/jfreechart<0:1.0.13-2.3.1.ep1.el4
0:1.0.13-2.3.1.ep1.el4
redhat/jgroups<1:2.4.7-1.ep1.el4
1:2.4.7-1.ep1.el4
redhat/quartz<0:1.5.2-1jpp.patch01.ep1.4.el4
0:1.5.2-1jpp.patch01.ep1.4.el4
redhat/rh-eap-docs<0:4.2.0-6.GA_CP08.ep1.3.el4
0:4.2.0-6.GA_CP08.ep1.3.el4
redhat/xerces-j2<0:2.7.1-9jpp.4.patch_02.1.ep1.el4
0:2.7.1-9jpp.4.patch_02.1.ep1.el4
redhat/xml-security<0:1.3.0-1.3.patch01.ep1.2.el4
0:1.3.0-1.3.patch01.ep1.2.el4
redhat/glassfish-jsf<0:1.2_13-2.1.ep1.el5
0:1.2_13-2.1.ep1.el5
redhat/hibernate3<1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5
1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5
redhat/hibernate3-annotations<0:3.3.1-1.11GA_CP02.ep1.el5
0:3.3.1-1.11GA_CP02.ep1.el5
redhat/hibernate3-entitymanager<0:3.3.2-2.5.1.ep1.el5
0:3.3.2-2.5.1.ep1.el5
redhat/jacorb<0:2.3.0-1jpp.ep1.9.1.el5
0:2.3.0-1jpp.ep1.9.1.el5
redhat/jboss-aop<0:1.5.5-3.CP04.2.ep1.el5
0:1.5.5-3.CP04.2.ep1.el5
redhat/jbossas<0:4.2.0-5.GA_CP08.5.2.ep1.el5
0:4.2.0-5.GA_CP08.5.2.ep1.el5
redhat/jboss-common<0:1.2.1-0jpp.ep1.3.el5.1
0:1.2.1-0jpp.ep1.3.el5.1
redhat/jboss-remoting<0:2.2.3-3.SP1.ep1.el5
0:2.2.3-3.SP1.ep1.el5
redhat/jboss-seam<0:1.2.1-1.ep1.14.el5
0:1.2.1-1.ep1.14.el5
redhat/jbossts<1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5
1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5
redhat/jbossweb<0:2.0.0-6.CP12.0jpp.ep1.2.el5
0:2.0.0-6.CP12.0jpp.ep1.2.el5
redhat/jcommon<0:1.0.16-1.1.ep1.el5
0:1.0.16-1.1.ep1.el5
redhat/jfreechart<0:1.0.13-2.3.1.ep1.el5
0:1.0.13-2.3.1.ep1.el5
redhat/jgroups<1:2.4.7-1.ep1.el5
1:2.4.7-1.ep1.el5
redhat/quartz<0:1.5.2-1jpp.patch01.ep1.4.1.el5
0:1.5.2-1jpp.patch01.ep1.4.1.el5
redhat/rh-eap-docs<0:4.2.0-6.GA_CP08.ep1.3.el5
0:4.2.0-6.GA_CP08.ep1.3.el5
redhat/xml-security<0:1.3.0-1.3.patch01.ep1.2.1.el5
0:1.3.0-1.3.patch01.ep1.2.1.el5
redhat/java<1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5
1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5
redhat/xerces-j2<0:2.7.1-7jpp.2.el5_4.2
0:2.7.1-7jpp.2.el5_4.2
redhat/xerces-j2<0:2.7.1-12.6.el6_0
0:2.7.1-12.6.el6_0
redhat/glassfish-jaxb<0:2.1.4-1.12.patch03.ep1.el4
0:2.1.4-1.12.patch03.ep1.el4
redhat/jbossas<0:4.3.0-6.GA_CP07.4.ep1.el4
0:4.3.0-6.GA_CP07.4.ep1.el4
redhat/jboss-messaging<0:1.4.0-3.SP3_CP09.4.ep1.el4
0:1.4.0-3.SP3_CP09.4.ep1.el4
redhat/jboss-seam<0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4
0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4
redhat/jboss-seam2<0:2.0.2.FP-1.ep1.21.el4
0:2.0.2.FP-1.ep1.21.el4
redhat/jbossws<0:2.0.1-4.SP2_CP07.2.ep1.el4
0:2.0.1-4.SP2_CP07.2.ep1.el4
redhat/jbossws-common<0:1.0.0-2.GA_CP05.1.ep1.el4
0:1.0.0-2.GA_CP05.1.ep1.el4
redhat/jbossws-framework<0:2.0.1-1.GA_CP05.1.ep1.el4
0:2.0.1-1.GA_CP05.1.ep1.el4
redhat/rh-eap-docs<0:4.3.0-6.GA_CP07.ep1.3.el4
0:4.3.0-6.GA_CP07.ep1.3.el4
redhat/glassfish-jaxb<0:2.1.4-1.12.patch03.1.ep1.el5
0:2.1.4-1.12.patch03.1.ep1.el5
redhat/jbossas<0:4.3.0-6.GA_CP07.4.2.ep1.el5
0:4.3.0-6.GA_CP07.4.2.ep1.el5
redhat/jboss-messaging<0:1.4.0-3.SP3_CP09.4.ep1.el5
0:1.4.0-3.SP3_CP09.4.ep1.el5
redhat/jboss-seam<0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1
0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1
redhat/jboss-seam2<0:2.0.2.FP-1.ep1.18.el5
0:2.0.2.FP-1.ep1.18.el5
redhat/jbossws<0:2.0.1-4.SP2_CP07.2.1.ep1.el5
0:2.0.1-4.SP2_CP07.2.1.ep1.el5
redhat/jbossws-common<0:1.0.0-2.GA_CP05.1.ep1.el5
0:1.0.0-2.GA_CP05.1.ep1.el5
redhat/jbossws-framework<0:2.0.1-1.GA_CP05.1.ep1.el5
0:2.0.1-1.GA_CP05.1.ep1.el5
redhat/rh-eap-docs<0:4.3.0-6.GA_CP07.ep1.3.el5
0:4.3.0-6.GA_CP07.ep1.3.el5
redhat/java<1.5.0-sun-0:1.5.0.22-1jpp.1.el4
1.5.0-sun-0:1.5.0.22-1jpp.1.el4
redhat/java<1.6.0-ibm-1:1.6.0.7-1jpp.3.el4
1.6.0-ibm-1:1.6.0.7-1jpp.3.el4
redhat/java<1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8
1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8
redhat/java<1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3
1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3
redhat/jasperreports-server-pro<0:4.7.1-2.el6e
0:4.7.1-2.el6e
redhat/java<1.5.0-sun-0:1.5.0.20-1jpp.1.el5
1.5.0-sun-0:1.5.0.20-1jpp.1.el5
redhat/java<1.6.0-sun-1:1.6.0.15-1jpp.1.el5
1.6.0-sun-1:1.6.0.15-1jpp.1.el5
redhat/java<1.5.0-ibm-1:1.5.0.10-1jpp.4.el5
1.5.0-ibm-1:1.5.0.10-1jpp.4.el5
redhat/java<1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5
1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5
redhat/java<1.6.0-ibm-1:1.6.0.6-1jpp.3.el5
1.6.0-ibm-1:1.6.0.6-1jpp.3.el5
IBM Security Verify Governance - Identity Manager<=10.0
Oracle Java SE 7=1.5.0
Oracle Java SE 7=1.5.0-update1
Oracle Java SE 7=1.5.0-update10
Oracle Java SE 7=1.5.0-update11
Oracle Java SE 7=1.5.0-update12
Oracle Java SE 7=1.5.0-update13
Oracle Java SE 7=1.5.0-update14
Oracle Java SE 7=1.5.0-update15
Oracle Java SE 7=1.5.0-update16
Oracle Java SE 7=1.5.0-update17
Oracle Java SE 7=1.5.0-update18
Oracle Java SE 7=1.5.0-update19
Oracle Java SE 7=1.5.0-update2
Oracle Java SE 7=1.5.0-update3
Oracle Java SE 7=1.5.0-update4
Oracle Java SE 7=1.5.0-update5
Oracle Java SE 7=1.5.0-update6
Oracle Java SE 7=1.5.0-update7
Oracle Java SE 7=1.5.0-update8
Oracle Java SE 7=1.5.0-update9
Oracle Java SE 7=1.6.0
Oracle Java SE 7=1.6.0-update1
Oracle Java SE 7=1.6.0-update10
Oracle Java SE 7=1.6.0-update11
Oracle Java SE 7=1.6.0-update12
Oracle Java SE 7=1.6.0-update13
Oracle Java SE 7=1.6.0-update14
Oracle Java SE 7=1.6.0-update2
Oracle Java SE 7=1.6.0-update3
Oracle Java SE 7=1.6.0-update4
Oracle Java SE 7=1.6.0-update5
Oracle Java SE 7=1.6.0-update6
Oracle Java SE 7=1.6.0-update7
Red Hat Fedora=10
Red Hat Fedora=11
openSUSE=11.0
openSUSE=11.1
openSUSE=11.2
SUSE Linux Enterprise Server=9
SUSE Linux Enterprise Server=10-sp2
SUSE Linux Enterprise Server=10-sp3
SUSE Linux Enterprise Server=11
Debian Linux=4.0
Debian Linux=5.0
Ubuntu=6.06
Ubuntu=8.04
Ubuntu=8.10
Ubuntu=9.04
Ubuntu=9.10
Oracle Primavera P6 Enterprise Project Portfolio Management=6.1
Oracle Primavera P6 Enterprise Project Portfolio Management=6.2.1
Oracle Primavera P6 Enterprise Project Portfolio Management=7.0
Oracle Primavera Web Services=6.2.1
Oracle Primavera Web Services=7.0
Oracle Primavera Web Services=7.0-sp1
Apache Xerces=2.9.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2009-2625?

    CVE-2009-2625 is classified as a denial of service vulnerability, which can critically impact the availability of affected applications.

  • How do I fix CVE-2009-2625?

    To fix CVE-2009-2625, upgrade the affected Java Runtime Environment to the latest version provided by your vendor.

  • Which products are affected by CVE-2009-2625?

    CVE-2009-2625 affects Java Runtime Environment versions, including specific builds from IBM and Red Hat that use Apache Xerces.

  • Can CVE-2009-2625 be exploited remotely?

    Yes, CVE-2009-2625 can be exploited remotely using specially-crafted XML input that triggers an infinite loop.

  • What impact does CVE-2009-2625 have on my system?

    CVE-2009-2625 can cause applications to hang, leading to potential denial of service and disrupting normal operations.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203