10
CVSSv2

CVE-2008-3111

Published: 09/07/2008 Updated: 30/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x prior to 1.4.2_18 allow context-dependent malicious users to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 5.0

sun jre 1.4.2_11

sun jre 1.4.2_12

sun jre 1.4.2_02

sun jre 1.4.2_03

sun jre 5.0

sun jdk 6

sun jre 1.4.2_13

sun jre 1.4.2_14

sun jre 1.4.2_04

sun jre 1.4.2_05

sun sdk 1.4.2

sun sdk 1.4.2_01

sun sdk 1.4.2_09

sun sdk 1.4.2_10

sun sdk 1.4.2_17

sun jre 6

sun sdk 1.4

sun sdk 1.4.2_07

sun sdk 1.4.2_08

sun sdk 1.4.2_15

sun sdk 1.4.2_16

sun jre 1.4

sun jre 1.4.2_10

sun jre 1.4.2_9

sun jre 1.4.2_01

sun jre 1.4.2_16

sun jre 1.4.2_17

sun sdk 1.4.2_05

sun sdk 1.4.2_06

sun sdk 1.4.2_13

sun sdk 1.4.2_14

sun jre 1.4.2_15

sun jre 1.4.2_8

sun jre 1.4.2_06

sun jre 1.4.2_07

sun sdk 1.4.2_02

sun sdk 1.4.2_03

sun sdk 1.4.2_04

sun sdk 1.4.2_11

sun sdk 1.4.2_12

References

CWE-119CWE-20http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1http://secunia.com/advisories/31010http://www.redhat.com/support/errata/RHSA-2008-0595.htmlhttp://secunia.com/advisories/31600http://www.redhat.com/support/errata/RHSA-2008-0790.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.htmlhttp://secunia.com/advisories/31055http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.htmlhttp://www.zerodayinitiative.com/advisories/ZDI-08-043/http://www.securityfocus.com/bid/30148http://secunia.com/advisories/31497http://secunia.com/advisories/31320http://www.us-cert.gov/cas/techalerts/TA08-193A.htmlhttp://support.apple.com/kb/HT3179http://secunia.com/advisories/32018http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.htmlhttp://support.apple.com/kb/HT3178http://secunia.com/advisories/32180http://www.vmware.com/security/advisories/VMSA-2008-0016.htmlhttp://marc.info/?l=bugtraq&m=122331139823057&w=2http://secunia.com/advisories/32179http://www.securitytracker.com/id?1020452http://security.gentoo.org/glsa/glsa-200911-02.xmlhttp://secunia.com/advisories/37386http://www.vupen.com/english/advisories/2008/2056/referenceshttp://www.vupen.com/english/advisories/2008/2740http://secunia.com/advisories/31736https://exchange.xforce.ibmcloud.com/vulnerabilities/43664https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541http://www.securityfocus.com/archive/1/497041/100/0/threadedhttp://www.securityfocus.com/archive/1/494505/100/0/threadedhttps://nvd.nist.gov