9.3
CVSSv2

CVE-2008-1188

Published: 06/03/2008 Updated: 31/07/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and previous versions, and 5.0 Update 14 and previous versions, allow remote malicious users to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka "The first two issues."

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 1.5.0

sun jdk 1.6.0

sun jre 1.5.0

sun jre 1.6.0

References

CWE-119http://sunsolve.sun.com/search/document.do?assetkey=1-26-233323-1http://www.redhat.com/support/errata/RHSA-2008-0186.htmlhttp://secunia.com/advisories/29273http://www.us-cert.gov/cas/techalerts/TA08-066A.htmlhttp://www.securitytracker.com/id?1019549http://secunia.com/advisories/29239http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0210.htmlhttp://secunia.com/advisories/29498http://secunia.com/advisories/29582http://www.gentoo.org/security/en/glsa/glsa-200804-20.xmlhttp://security.gentoo.org/glsa/glsa-200804-28.xmlhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.htmlhttp://secunia.com/advisories/29858http://secunia.com/advisories/29897http://secunia.com/advisories/30676http://www.vmware.com/security/advisories/VMSA-2008-0010.htmlhttp://secunia.com/advisories/31497http://secunia.com/advisories/30780http://www.gentoo.org/security/en/glsa/glsa-200806-11.xmlhttp://secunia.com/advisories/32018http://support.apple.com/kb/HT3178http://support.apple.com/kb/HT3179http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0267.htmlhttp://www.zerodayinitiative.com/advisories/ZDI-08-010/http://www.zerodayinitiative.com/advisories/ZDI-08-009/http://www.vupen.com/english/advisories/2008/0770/referenceshttp://www.vupen.com/english/advisories/2008/1856/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/41133https://exchange.xforce.ibmcloud.com/vulnerabilities/41029https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11209https://nvd.nist.gov