9.3
CVSSv2

CVE-2008-5357

Published: 05/12/2008 Updated: 09/10/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and previous versions; JDK and JRE 5.0 Update 16 and previous versions; SDK and JRE 1.4.2_18 and previous versions; and SDK and JRE 1.3.1_23 and previous versions might allow remote malicious users to execute arbitrary code via a crafted TrueType font file, which triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jre 1.3.1_03

sun jre 1.3.1_04

sun jre 1.3.1_05

sun jre 1.3.1_06

sun jre 1.3.1_20

sun jre 1.3.1_21

sun jre 1.3.1_22

sun jre 1.3.1_23

sun jre 1.4.2_12

sun jre 1.4.2_13

sun jre 1.4.2_14

sun jre 1.4.2_15

sun jre 1.4.2_16

sun jre 1.6.0

sun jre 1.3.1

sun jre 1.3.1_08

sun jre 1.3.1_10

sun jre 1.3.1_15

sun jre 1.3.1_17

sun jre 1.3.1_19

sun jre 1.4.2

sun jre 1.4.2_2

sun jre 1.4.2_9

sun jre 1.4.2_11

sun jre 1.4.2_18

sun jre 1.5.0

sun jre 1.3.1_11

sun jre 1.3.1_12

sun jre 1.3.1_13

sun jre 1.3.1_14

sun jre 1.4.2_4

sun jre 1.4.2_5

sun jre 1.4.2_6

sun jre 1.4.2_7

sun jre 1.3.1_2

sun jre 1.3.1_07

sun jre 1.3.1_09

sun jre 1.3.1_16

sun jre 1.3.1_18

sun jre 1.4.2_1

sun jre 1.4.2_3

sun jre 1.4.2_8

sun jre 1.4.2_10

sun jre 1.4.2_17

sun jdk 1.5.0

sun jdk 1.6.0

sun sdk 1.3.1_04

sun sdk 1.3.1_05

sun sdk 1.3.1_06

sun sdk 1.3.1_07

sun sdk 1.3.1_20

sun sdk 1.3.1_21

sun sdk 1.3.1_22

sun sdk 1.3.1_23

sun sdk 1.4.2_09

sun sdk 1.4.2_9

sun sdk 1.4.2_10

sun sdk 1.4.2_11

sun sdk 1.3.1_01

sun sdk 1.3.1_02

sun sdk 1.3.1_09

sun sdk 1.3.1_11

sun sdk 1.3.1_16

sun sdk 1.3.1_18

sun sdk 1.4.2_1

sun sdk 1.4.2_02

sun sdk 1.4.2_7

sun sdk 1.4.2_08

sun sdk 1.4.2_12

sun sdk 1.4.2_14

sun sdk 1.3.1_12

sun sdk 1.3.1_13

sun sdk 1.3.1_14

sun sdk 1.3.1_15

sun sdk 1.4.2_3

sun sdk 1.4.2_4

sun sdk 1.4.2_04

sun sdk 1.4.2_5

sun sdk 1.4.2_16

sun sdk 1.4.2_17

sun sdk 1.4.2_18

sun sdk 1.3.1

sun sdk 1.3.1_01a

sun sdk 1.3.1_03

sun sdk 1.3.1_08

sun sdk 1.3.1_10

sun sdk 1.3.1_17

sun sdk 1.3.1_19

sun sdk 1.4.2

sun sdk 1.4.2_2

sun sdk 1.4.2_03

sun sdk 1.4.2_6

sun sdk 1.4.2_8

sun sdk 1.4.2_13

sun sdk 1.4.2_15

Vendor Advisories

Synopsis Critical: java-150-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-150-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by the R ...
Synopsis Critical: java-160-sun security update Type/Severity Security Advisory: Critical Topic Updated java-160-sun packages that correct several security issues arenow available for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by t ...
Synopsis Critical: java-160-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 Extras and Red Hat EnterpriseLinux 5 SupplementaryThis update has been rated as having critical ...
Synopsis Low: java-150-ibm security update Type/Severity Security Advisory: Low Topic Updated java-150-ibm packages that fix several security issues are nowavailable for Red Hat Network Satellite ServerThis update has been rated as having low security impact by the Red HatSecurity Response Team ...
Synopsis Critical: java-150-sun security update Type/Severity Security Advisory: Critical Topic Updated java-150-sun packages that correct several security issues arenow available for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by t ...

References

CWE-189http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=760http://sunsolve.sun.com/search/document.do?assetkey=1-26-244987-1http://rhn.redhat.com/errata/RHSA-2008-1025.htmlhttp://secunia.com/advisories/33015http://secunia.com/advisories/32991http://rhn.redhat.com/errata/RHSA-2008-1018.htmlhttp://www.securityfocus.com/bid/32608http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.htmlhttp://www.us-cert.gov/cas/techalerts/TA08-340A.htmlhttp://secunia.com/advisories/33710http://secunia.com/advisories/33187http://support.avaya.com/elmodocs2/security/ASA-2008-485.htmhttp://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2009-012.htmhttp://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=http://www.redhat.com/support/errata/RHSA-2009-0016.htmlhttp://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdfhttp://secunia.com/advisories/34233http://secunia.com/advisories/34259http://www.vupen.com/english/advisories/2009/0672http://marc.info/?l=bugtraq&m=123678756409861&w=2http://secunia.com/advisories/34447http://www.redhat.com/support/errata/RHSA-2009-0369.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.htmlhttp://secunia.com/advisories/34605http://secunia.com/advisories/35065http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.htmlhttp://secunia.com/advisories/34972https://rhn.redhat.com/errata/RHSA-2009-0466.htmlhttp://osvdb.org/50517http://security.gentoo.org/glsa/glsa-200911-02.xmlhttp://secunia.com/advisories/37386http://secunia.com/advisories/38539http://www.vupen.com/english/advisories/2008/3339http://marc.info/?l=bugtraq&m=126583436323697&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/47050https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6505https://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2009:0016