10
CVSSv2

CVE-2008-3111

Published: 09/07/2008 Updated: 30/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x prior to 1.4.2_18 allow context-dependent malicious users to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 5.0

sun jre 1.4.2 16

sun sdk 1.4.2

sun jre 5.0

sun jre 1.4.2 01

sun sdk 1.4.2 10

sun sdk 1.4.2 12

sun jre 6

sun sdk 1.4.2 17

sun jre 1.4.2 03

sun sdk 1.4.2 14

sun jre 1.4.2 15

sun sdk 1.4.2 04

sun jdk 6

sun sdk 1.4.2 01

sun jre 1.4.2 13

sun sdk 1.4.2 13

sun jre 1.4.2 8

sun jre 1.4.2 06

sun jre 1.4.2 12

sun jre 1.4.2 07

sun jre 1.4.2 14

sun sdk 1.4.2 07

sun jre 1.4.2 10

sun jre 1.4.2 17

sun sdk 1.4.2 09

sun jre 1.4.2 04

sun sdk 1.4.2 02

sun jre 1.4

sun jre 1.4.2 9

sun sdk 1.4.2 16

sun sdk 1.4.2 11

sun jre 1.4.2 11

sun jre 1.4.2 05

sun sdk 1.4

sun sdk 1.4.2 08

sun sdk 1.4.2 03

sun sdk 1.4.2 05

sun jre 1.4.2 02

sun sdk 1.4.2 06

sun sdk 1.4.2 15

References

CWE-119CWE-20http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1http://secunia.com/advisories/31010http://www.redhat.com/support/errata/RHSA-2008-0595.htmlhttp://secunia.com/advisories/31600http://www.redhat.com/support/errata/RHSA-2008-0790.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.htmlhttp://secunia.com/advisories/31055http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.htmlhttp://www.zerodayinitiative.com/advisories/ZDI-08-043/http://www.securityfocus.com/bid/30148http://secunia.com/advisories/31497http://secunia.com/advisories/31320http://www.us-cert.gov/cas/techalerts/TA08-193A.htmlhttp://support.apple.com/kb/HT3179http://secunia.com/advisories/32018http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.htmlhttp://support.apple.com/kb/HT3178http://secunia.com/advisories/32180http://www.vmware.com/security/advisories/VMSA-2008-0016.htmlhttp://marc.info/?l=bugtraq&m=122331139823057&w=2http://secunia.com/advisories/32179http://www.securitytracker.com/id?1020452http://security.gentoo.org/glsa/glsa-200911-02.xmlhttp://secunia.com/advisories/37386http://www.vupen.com/english/advisories/2008/2056/referenceshttp://www.vupen.com/english/advisories/2008/2740http://secunia.com/advisories/31736https://exchange.xforce.ibmcloud.com/vulnerabilities/43664https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541http://www.securityfocus.com/archive/1/497041/100/0/threadedhttp://www.securityfocus.com/archive/1/494505/100/0/threadedhttps://nvd.nist.gov