6.8
CVSSv2

CVE-2008-1196

Published: 06/03/2008 Updated: 31/07/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and previous versions and 5.0 Update 14 and previous versions; and SDK and JRE 1.4.2_16 and previous versions; allows remote malicious users to execute arbitrary code via a crafted JNLP file.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 1.5.0

sun jdk 1.6.0

sun jre 1.4.2_6

sun jre 1.4.2_7

sun jre 1.4.2_8

sun jre 1.4.2_9

sun jre 1.5.0

sun jre 1.4.2_3

sun jre 1.4.2_5

sun jre 1.4.2_10

sun jre 1.4.2_12

sun jre 1.4.2_14

sun jre 1.6.0

sun jre 1.4.2

sun jre 1.4.2_1

sun jre 1.4.2_15

sun jre 1.4.2_16

sun jre 1.4.2_2

sun jre 1.4.2_4

sun jre 1.4.2_11

sun jre 1.4.2_13

sun sdk 1.4.2_8

sun sdk 1.4.2_9

sun sdk 1.4.2_10

sun sdk 1.4.2_11

sun sdk 1.4.2

sun sdk 1.4.2_1

sun sdk 1.4.2_2

sun sdk 1.4.2_16

sun sdk 1.4.2_4

sun sdk 1.4.2_6

sun sdk 1.4.2_13

sun sdk 1.4.2_15

sun sdk 1.4.2_3

sun sdk 1.4.2_5

sun sdk 1.4.2_7

sun sdk 1.4.2_12

sun sdk 1.4.2_14

References

CWE-119http://sunsolve.sun.com/search/document.do?assetkey=1-26-233327-1http://www.redhat.com/support/errata/RHSA-2008-0186.htmlhttp://www.securitytracker.com/id?1019552http://secunia.com/advisories/29273http://www.us-cert.gov/cas/techalerts/TA08-066A.htmlhttp://www.kb.cert.org/vuls/id/223028http://secunia.com/advisories/29239http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0210.htmlhttp://secunia.com/advisories/29498http://secunia.com/advisories/29582http://www.gentoo.org/security/en/glsa/glsa-200804-20.xmlhttp://security.gentoo.org/glsa/glsa-200804-28.xmlhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.htmlhttp://secunia.com/advisories/29858http://secunia.com/advisories/29897http://secunia.com/advisories/30676http://secunia.com/advisories/31586http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5033642.htmlhttp://secunia.com/advisories/30780http://secunia.com/advisories/31067http://www.gentoo.org/security/en/glsa/glsa-200806-11.xmlhttp://secunia.com/advisories/31497http://www.vmware.com/security/advisories/VMSA-2008-0010.htmlhttp://download.novell.com/Download?buildid=q5exhSqeBjA~http://secunia.com/advisories/31580http://www.redhat.com/support/errata/RHSA-2008-0555.htmlhttp://support.apple.com/kb/HT3178http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.htmlhttp://support.apple.com/kb/HT3179http://secunia.com/advisories/32018http://www.redhat.com/support/errata/RHSA-2008-0267.htmlhttp://www.vupen.com/english/advisories/2008/0770/referenceshttp://www.vupen.com/english/advisories/2008/1856/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/41026https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10412https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/223028