9.3
CVSSv2

CVE-2008-1193

Published: 06/03/2008 Updated: 31/07/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in Java Runtime Environment Image Parsing Library in Sun JDK and JRE 6 Update 4 and previous versions, and 5.0 Update 14 and previous versions, allows remote malicious users to gain privileges via an untrusted application.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 1.5.0

sun jdk 1.6.0

sun jre 1.5.0

sun jre 1.6.0

Exploits

source: wwwsecurityfocuscom/bid/28125/info Sun Java Runtime Environment is prone to a heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the affected applicati ...

References

CWE-264http://sunsolve.sun.com/search/document.do?assetkey=1-26-233325-1http://www.redhat.com/support/errata/RHSA-2008-0186.htmlhttp://secunia.com/advisories/29273http://www.securityfocus.com/bid/28125http://www.us-cert.gov/cas/techalerts/TA08-066A.htmlhttp://www.securitytracker.com/id?1019551http://secunia.com/advisories/29239http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0210.htmlhttp://secunia.com/advisories/29498http://secunia.com/advisories/29582http://dev2dev.bea.com/pub/advisory/277http://secunia.com/advisories/29841http://www.gentoo.org/security/en/glsa/glsa-200804-20.xmlhttp://security.gentoo.org/glsa/glsa-200804-28.xmlhttp://www.redhat.com/support/errata/RHSA-2008-0244.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0245.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.htmlhttp://secunia.com/advisories/29858http://secunia.com/advisories/30003http://secunia.com/advisories/29897http://www.gentoo.org/security/en/glsa/glsa-200806-11.xmlhttp://www.vmware.com/security/advisories/VMSA-2008-0010.htmlhttp://secunia.com/advisories/30676http://secunia.com/advisories/31497http://secunia.com/advisories/30780http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.htmlhttp://support.apple.com/kb/HT3178http://support.apple.com/kb/HT3179http://secunia.com/advisories/32018http://www.redhat.com/support/errata/RHSA-2008-0267.htmlhttp://www.vupen.com/english/advisories/2008/0770/referenceshttp://www.vupen.com/english/advisories/2008/1252http://www.vupen.com/english/advisories/2008/1856/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/41028https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11409https://nvd.nist.govhttps://www.exploit-db.com/exploits/31343/