Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.
References
Link Providers
http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=122331139823057&w=2 cve-icon cve-icon
http://secunia.com/advisories/31010 cve-icon cve-icon
http://secunia.com/advisories/31055 cve-icon cve-icon
http://secunia.com/advisories/31320 cve-icon cve-icon
http://secunia.com/advisories/31497 cve-icon cve-icon
http://secunia.com/advisories/31600 cve-icon cve-icon
http://secunia.com/advisories/31736 cve-icon cve-icon
http://secunia.com/advisories/32018 cve-icon cve-icon
http://secunia.com/advisories/32179 cve-icon cve-icon
http://secunia.com/advisories/32180 cve-icon cve-icon
http://secunia.com/advisories/37386 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200911-02.xml cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1 cve-icon cve-icon
http://support.apple.com/kb/HT3178 cve-icon cve-icon
http://support.apple.com/kb/HT3179 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0595.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0790.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/494505/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/497041/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/30148 cve-icon cve-icon
http://www.securitytracker.com/id?1020452 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA08-193A.html cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2008-0016.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2056/references cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2740 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-08-043/ cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/43664 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-3111 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-3111 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2008-07-09T23:00:00

Updated: 2024-08-07T09:28:40.707Z

Reserved: 2008-07-09T00:00:00

Link: CVE-2008-3111

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-07-09T23:41:00.000

Modified: 2024-11-21T00:48:27.347

Link: CVE-2008-3111

cve-icon Redhat

Severity : Critical

Publid Date: 2008-07-08T00:00:00Z

Links: CVE-2008-3111 - Bugzilla