CVE-2008-3111

high

Description

Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.

References

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541

https://exchange.xforce.ibmcloud.com/vulnerabilities/43664

http://www.zerodayinitiative.com/advisories/ZDI-08-043/

http://www.vupen.com/english/advisories/2008/2740

http://www.vupen.com/english/advisories/2008/2056/references

http://www.vmware.com/security/advisories/VMSA-2008-0016.html

http://www.us-cert.gov/cas/techalerts/TA08-193A.html

http://www.securitytracker.com/id?1020452

http://www.securityfocus.com/bid/30148

http://www.securityfocus.com/archive/1/497041/100/0/threaded

http://www.securityfocus.com/archive/1/494505/100/0/threaded

http://www.redhat.com/support/errata/RHSA-2008-0790.html

http://www.redhat.com/support/errata/RHSA-2008-0595.html

http://support.apple.com/kb/HT3179

http://support.apple.com/kb/HT3178

http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1

http://security.gentoo.org/glsa/glsa-200911-02.xml

http://secunia.com/advisories/37386

http://secunia.com/advisories/32180

http://secunia.com/advisories/32179

http://secunia.com/advisories/32018

http://secunia.com/advisories/31736

http://secunia.com/advisories/31600

http://secunia.com/advisories/31497

http://secunia.com/advisories/31320

http://secunia.com/advisories/31055

http://secunia.com/advisories/31010

http://marc.info/?l=bugtraq&m=122331139823057&w=2

http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html

http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html

http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html

http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html

Details

Source: Mitre, NVD

Published: 2008-07-09

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High