CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
88.8%
Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.
Vendor | Product | Version | CPE |
---|---|---|---|
sun | jdk | * | cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:* |
sun | jdk | * | cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:* |
lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html
lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html
lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html
lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
marc.info/?l=bugtraq&m=122331139823057&w=2
rhn.redhat.com/errata/RHSA-2008-0955.html
secunia.com/advisories/31010
secunia.com/advisories/31055
secunia.com/advisories/31320
secunia.com/advisories/31497
secunia.com/advisories/31600
secunia.com/advisories/31736
secunia.com/advisories/32018
secunia.com/advisories/32179
secunia.com/advisories/32180
secunia.com/advisories/32436
secunia.com/advisories/32826
secunia.com/advisories/33194
secunia.com/advisories/35065
secunia.com/advisories/37386
security.gentoo.org/glsa/glsa-200911-02.xml
sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1
support.apple.com/kb/HT3178
support.apple.com/kb/HT3179
support.avaya.com/elmodocs2/security/ASA-2008-428.htm
www.redhat.com/support/errata/RHSA-2008-0594.html
www.redhat.com/support/errata/RHSA-2008-0595.html
www.redhat.com/support/errata/RHSA-2008-0790.html
www.redhat.com/support/errata/RHSA-2008-0906.html
www.securityfocus.com/archive/1/497041/100/0/threaded
www.securityfocus.com/bid/30148
www.securitytracker.com/id?1020452
www.us-cert.gov/cas/techalerts/TA08-193A.html
www.vmware.com/security/advisories/VMSA-2008-0016.html
www.vupen.com/english/advisories/2008/2056/references
www.vupen.com/english/advisories/2008/2740
www.zerodayinitiative.com/advisories/ZDI-08-042/
exchange.xforce.ibmcloud.com/vulnerabilities/43666
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11102