{
  "threat_severity" : "Low",
  "public_date" : "2009-08-05T00:00:00Z",
  "bugzilla" : {
    "description" : "OpenJDK OpenType checks can be bypassed (6736293)",
    "id" : "513220",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
  },
  "cvss" : {
    "cvss_base_score" : "4.3",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:P/I:N/A:N",
    "status" : "verified"
  },
  "details" : [ "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object." ],
  "affected_release" : [ {
    "product_name" : "Extras for RHEL 4",
    "release_date" : "2009-08-06T00:00:00Z",
    "advisory" : "RHSA-2009:1200",
    "cpe" : "cpe:/a:redhat:rhel_extras:4",
    "package" : "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2009-08-06T00:00:00Z",
    "advisory" : "RHSA-2009:1201",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5"
  }, {
    "product_name" : "Supplementary for Red Hat Enterprise Linux 5",
    "release_date" : "2009-08-06T00:00:00Z",
    "advisory" : "RHSA-2009:1200",
    "cpe" : "cpe:/a:redhat:rhel_extras:5",
    "package" : "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2009-2476\nhttps://nvd.nist.gov/vuln/detail/CVE-2009-2476" ],
  "name" : "CVE-2009-2476",
  "csaw" : false
}