CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
87.1%
Buffer overflow in Sun Java Runtime Environment (JRE) in JDK and JRE 5.0 before Update 10, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allows context-dependent attackers to gain privileges via unspecified vectors related to font processing.
Vendor | Product | Version | CPE |
---|---|---|---|
sun | jre | 1.3.1 | cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:* |
sun | jre | 1.3.1_2 | cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:* |
sun | jre | 1.3.1_03 | cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:* |
sun | jre | 1.3.1_04 | cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:* |
sun | jre | 1.3.1_05 | cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:* |
sun | jre | 1.3.1_06 | cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:* |
sun | jre | 1.3.1_07 | cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:* |
sun | jre | 1.3.1_08 | cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:* |
sun | jre | 1.3.1_09 | cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:* |
sun | jre | 1.3.1_10 | cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:* |
lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html
lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html
marc.info/?l=bugtraq&m=122331139823057&w=2
secunia.com/advisories/31010
secunia.com/advisories/31320
secunia.com/advisories/31497
secunia.com/advisories/31600
secunia.com/advisories/31736
secunia.com/advisories/32018
secunia.com/advisories/32179
secunia.com/advisories/32180
secunia.com/advisories/33236
secunia.com/advisories/33237
secunia.com/advisories/37386
security.gentoo.org/glsa/glsa-200911-02.xml
sunsolve.sun.com/search/document.do?assetkey=1-66-238666-1
support.apple.com/kb/HT3178
support.apple.com/kb/HT3179
support.avaya.com/elmodocs2/security/ASA-2008-300.htm
support.avaya.com/elmodocs2/security/ASA-2008-507.htm
support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014
support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717
www.redhat.com/support/errata/RHSA-2008-0790.html
www.redhat.com/support/errata/RHSA-2008-1043.html
www.redhat.com/support/errata/RHSA-2008-1044.html
www.securityfocus.com/archive/1/497041/100/0/threaded
www.securityfocus.com/bid/30147
www.securitytracker.com/id?1020461
www.us-cert.gov/cas/techalerts/TA08-193A.html
www.vmware.com/security/advisories/VMSA-2008-0016.html
www.vupen.com/english/advisories/2008/2056/references
www.vupen.com/english/advisories/2008/2740
exchange.xforce.ibmcloud.com/vulnerabilities/43656