CWE
399
Advisory Published
Updated

CVE-2009-3877

First published: Thu Nov 05 2009(Updated: )

Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
OpenJDK=1.5.0-update1
OpenJDK=1.5.0-update10
OpenJDK=1.5.0-update11
OpenJDK=1.5.0-update11_b03
OpenJDK=1.5.0-update12
OpenJDK=1.5.0-update13
OpenJDK=1.5.0-update14
OpenJDK=1.5.0-update15
OpenJDK=1.5.0-update16
OpenJDK=1.5.0-update17
OpenJDK=1.5.0-update18
OpenJDK=1.5.0-update19
OpenJDK=1.5.0-update2
OpenJDK=1.5.0-update20
OpenJDK=1.5.0-update21
OpenJDK=1.5.0-update3
OpenJDK=1.5.0-update4
OpenJDK=1.5.0-update5
OpenJDK=1.5.0-update6
OpenJDK=1.5.0-update7
OpenJDK=1.5.0-update7_b03
OpenJDK=1.5.0-update8
OpenJDK=1.5.0-update9
OpenJDK=1.6.0-update1
OpenJDK=1.6.0-update10
OpenJDK=1.6.0-update11
OpenJDK=1.6.0-update12
OpenJDK=1.6.0-update13
OpenJDK=1.6.0-update14
OpenJDK=1.6.0-update15
OpenJDK=1.6.0-update16
OpenJDK=1.6.0-update2
OpenJDK=1.6.0-update3
OpenJDK=1.6.0-update4
OpenJDK=1.6.0-update5
OpenJDK=1.6.0-update6
OpenJDK=1.6.0-update7
OpenJDK=1.6.0-update8
OpenJDK=1.6.0-update9
Sun JRE=1.4.2_1
Sun JRE=1.4.2_2
Sun JRE=1.4.2_02
Sun JRE=1.4.2_03
Sun JRE=1.4.2_3
Sun JRE=1.4.2_4
Sun JRE=1.4.2_04
Sun JRE=1.4.2_05
Sun JRE=1.4.2_5
Sun JRE=1.4.2_06
Sun JRE=1.4.2_6
Sun JRE=1.4.2_7
Sun JRE=1.4.2_07
Sun JRE=1.4.2_8
Sun JRE=1.4.2_08
Sun JRE=1.4.2_09
Sun JRE=1.4.2_9
Sun JRE=1.4.2_10
Sun JRE=1.4.2_11
Sun JRE=1.4.2_12
Sun JRE=1.4.2_13
Sun JRE=1.4.2_14
Sun JRE=1.4.2_15
Sun JRE=1.4.2_16
Sun JRE=1.4.2_17
Sun JRE=1.4.2_18
Sun JRE=1.4.2_19
Sun JRE=1.4.2_20
Sun JRE=1.4.2_21
Sun JRE=1.4.2_22
Sun JRE=1.4.2_23
Sun JRE=1.5.0-update1
Sun JRE=1.5.0-update10
Sun JRE=1.5.0-update11
Sun JRE=1.5.0-update12
Sun JRE=1.5.0-update13
Sun JRE=1.5.0-update14
Sun JRE=1.5.0-update15
Sun JRE=1.5.0-update16
Sun JRE=1.5.0-update17
Sun JRE=1.5.0-update18
Sun JRE=1.5.0-update19
Sun JRE=1.5.0-update2
Sun JRE=1.5.0-update20
Sun JRE=1.5.0-update21
Sun JRE=1.5.0-update3
Sun JRE=1.5.0-update4
Sun JRE=1.5.0-update5
Sun JRE=1.5.0-update6
Sun JRE=1.5.0-update7
Sun JRE=1.5.0-update8
Sun JRE=1.5.0-update9
Sun JRE=1.6.0-update_1
Sun JRE=1.6.0-update_2
Sun JRE=1.6.0-update_3
Sun JRE=1.6.0-update10
Sun JRE=1.6.0-update11
Sun JRE=1.6.0-update12
Sun JRE=1.6.0-update13
Sun JRE=1.6.0-update14
Sun JRE=1.6.0-update15
Sun JRE=1.6.0-update16
Sun JRE=1.6.0-update4
Sun JRE=1.6.0-update5
Sun JRE=1.6.0-update6
Sun JRE=1.6.0-update7
Sun JRE=1.6.0-update8
Sun JRE=1.6.0-update9
Sun SDK=1.4.2_01
Sun SDK=1.4.2_1
Sun SDK=1.4.2_2
Sun SDK=1.4.2_02
Sun SDK=1.4.2_03
Sun SDK=1.4.2_3
Sun SDK=1.4.2_04
Sun SDK=1.4.2_4
Sun SDK=1.4.2_5
Sun SDK=1.4.2_05
Sun SDK=1.4.2_6
Sun SDK=1.4.2_06
Sun SDK=1.4.2_07
Sun SDK=1.4.2_7
Sun SDK=1.4.2_8
Sun SDK=1.4.2_08
Sun SDK=1.4.2_09
Sun SDK=1.4.2_9
Sun SDK=1.4.2_10
Sun SDK=1.4.2_11
Sun SDK=1.4.2_12
Sun SDK=1.4.2_13
Sun SDK=1.4.2_14
Sun SDK=1.4.2_15
Sun SDK=1.4.2_16
Sun SDK=1.4.2_17
Sun SDK=1.4.2_18
Sun SDK=1.4.2_19
Sun SDK=1.4.2_20
Sun SDK=1.4.2_21
Sun SDK=1.4.2_22
Sun SDK=1.4.2_23
Linux kernel
Microsoft Windows
Oracle Solaris SPARC
Sun JRE=1.3.1_1
Sun JRE=1.3.1_01
Sun JRE=1.3.1_01a
Sun JRE=1.3.1_02
Sun JRE=1.3.1_2
Sun JRE=1.3.1_03
Sun JRE=1.3.1_3
Sun JRE=1.3.1_4
Sun JRE=1.3.1_04
Sun JRE=1.3.1_05
Sun JRE=1.3.1_5
Sun JRE=1.3.1_06
Sun JRE=1.3.1_6
Sun JRE=1.3.1_07
Sun JRE=1.3.1_7
Sun JRE=1.3.1_8
Sun JRE=1.3.1_08
Sun JRE=1.3.1_9
Sun JRE=1.3.1_09
Sun JRE=1.3.1_10
Sun JRE=1.3.1_11
Sun JRE=1.3.1_12
Sun JRE=1.3.1_13
Sun JRE=1.3.1_14
Sun JRE=1.3.1_15
Sun JRE=1.3.1_16
Sun JRE=1.3.1_17
Sun JRE=1.3.1_18
Sun JRE=1.3.1_19
Sun JRE=1.3.1_20
Sun JRE=1.3.1_21
Sun JRE=1.3.1_22
Sun JRE=1.3.1_23
Sun JRE=1.3.1_24
Sun JRE=1.3.1_25
Sun SDK=1.3.1_01
Sun SDK=1.3.1_01a
Sun SDK=1.3.1_2
Sun SDK=1.3.1_02
Sun SDK=1.3.1_03
Sun SDK=1.3.1_3
Sun SDK=1.3.1_4
Sun SDK=1.3.1_04
Sun SDK=1.3.1_5
Sun SDK=1.3.1_05
Sun SDK=1.3.1_6
Sun SDK=1.3.1_06
Sun SDK=1.3.1_7
Sun SDK=1.3.1_07
Sun SDK=1.3.1_8
Sun SDK=1.3.1_08
Sun SDK=1.3.1_9
Sun SDK=1.3.1_09
Sun SDK=1.3.1_10
Sun SDK=1.3.1_11
Sun SDK=1.3.1_12
Sun SDK=1.3.1_13
Sun SDK=1.3.1_14
Sun SDK=1.3.1_15
Sun SDK=1.3.1_16
Sun SDK=1.3.1_17
Sun SDK=1.3.1_18
Sun SDK=1.3.1_19
Sun SDK=1.3.1_20
Sun SDK=1.3.1_21
Sun SDK=1.3.1_22
Sun SDK=1.3.1_23
Sun SDK=1.3.1_24
Sun SDK=1.3.1_25

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2009-3877?

    CVE-2009-3877 is rated as a moderate severity vulnerability that allows remote attackers to cause a denial of service due to memory consumption.

  • How do I fix CVE-2009-3877?

    To fix CVE-2009-3877, upgrade to JDK and JRE 5.0 Update 22 or later, 6 Update 17 or later, or the appropriate updated versions of SDK and JRE 1.3.x and 1.4.x.

  • What impact does CVE-2009-3877 have on systems?

    CVE-2009-3877 can lead to a denial of service by consuming system memory, potentially causing affected applications to crash.

  • Which versions are affected by CVE-2009-3877?

    CVE-2009-3877 affects Sun Java SE in JDK and JRE versions 5.0 before Update 22, JDK and JRE 6 before Update 17, as well as SDK and JRE versions 1.3.x and 1.4.x before their respective updates.

  • What types of applications are vulnerable to CVE-2009-3877?

    Applications that utilize affected versions of Sun Java SE for processing HTTP headers are vulnerable to CVE-2009-3877.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203