Lucene search

K
nvd[email protected]NVD:CVE-2008-3111
HistoryJul 09, 2008 - 11:41 p.m.

CVE-2008-3111

2008-07-0923:41:00
CWE-20
CWE-119
web.nvd.nist.gov

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

8.8 High

AI Score

Confidence

High

0.656 Medium

EPSS

Percentile

97.9%

Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.

Affected configurations

NVD
Node
sunjdkMatch5.0update_1
OR
sunjdkMatch5.0update_10
OR
sunjdkMatch5.0update_11
OR
sunjdkMatch5.0update_12
OR
sunjdkMatch5.0update_13
OR
sunjdkMatch5.0update_14
OR
sunjdkMatch5.0update_15
OR
sunjdkMatch5.0update_2
OR
sunjdkMatch5.0update_3
OR
sunjdkMatch5.0update_4
OR
sunjdkMatch5.0update_5
OR
sunjdkMatch5.0update_6
OR
sunjdkMatch5.0update_7
OR
sunjdkMatch5.0update_8
OR
sunjdkMatch5.0update_9
OR
sunjdkMatch6update_1
OR
sunjdkMatch6update_2
OR
sunjdkMatch6update_3
OR
sunjreMatch1.4
OR
sunjreMatch1.4.2_01
OR
sunjreMatch1.4.2_02
OR
sunjreMatch1.4.2_03
OR
sunjreMatch1.4.2_04
OR
sunjreMatch1.4.2_05
OR
sunjreMatch1.4.2_06
OR
sunjreMatch1.4.2_07
OR
sunjreMatch1.4.2_8
OR
sunjreMatch1.4.2_9
OR
sunjreMatch1.4.2_10
OR
sunjreMatch1.4.2_11
OR
sunjreMatch1.4.2_12
OR
sunjreMatch1.4.2_13
OR
sunjreMatch1.4.2_14
OR
sunjreMatch1.4.2_15
OR
sunjreMatch1.4.2_16
OR
sunjreMatch1.4.2_17
OR
sunjreMatch5.0update_1
OR
sunjreMatch5.0update_10
OR
sunjreMatch5.0update_11
OR
sunjreMatch5.0update_12
OR
sunjreMatch5.0update_13
OR
sunjreMatch5.0update_14
OR
sunjreMatch5.0update_15
OR
sunjreMatch5.0update_2
OR
sunjreMatch5.0update_3
OR
sunjreMatch5.0update_4
OR
sunjreMatch5.0update_5
OR
sunjreMatch5.0update_6
OR
sunjreMatch5.0update_7
OR
sunjreMatch5.0update_8
OR
sunjreMatch5.0update_9
OR
sunjreMatch6update_1
OR
sunjreMatch6update_2
OR
sunjreMatch6update_3
OR
sunsdkMatch1.4
OR
sunsdkMatch1.4.2
OR
sunsdkMatch1.4.2_01
OR
sunsdkMatch1.4.2_02
OR
sunsdkMatch1.4.2_03
OR
sunsdkMatch1.4.2_04
OR
sunsdkMatch1.4.2_05
OR
sunsdkMatch1.4.2_06
OR
sunsdkMatch1.4.2_07
OR
sunsdkMatch1.4.2_08
OR
sunsdkMatch1.4.2_09
OR
sunsdkMatch1.4.2_10
OR
sunsdkMatch1.4.2_11
OR
sunsdkMatch1.4.2_12
OR
sunsdkMatch1.4.2_13
OR
sunsdkMatch1.4.2_14
OR
sunsdkMatch1.4.2_15
OR
sunsdkMatch1.4.2_16
OR
sunsdkMatch1.4.2_17

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

8.8 High

AI Score

Confidence

High

0.656 Medium

EPSS

Percentile

97.9%