Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2008-3111

Back to Search

SUSE Linux Security Vulnerability: CVE-2008-3111

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
07/09/2008
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.

Solution(s)

  • suse-upgrade-ibmjava2-jre
  • suse-upgrade-ibmjava2-sdk
  • suse-upgrade-ibmjava5-jre
  • suse-upgrade-ibmjava5-sdk
  • suse-upgrade-java-1_4_2-ibm
  • suse-upgrade-java-1_4_2-ibm-devel
  • suse-upgrade-java-1_4_2-ibm-jdbc
  • suse-upgrade-java-1_4_2-ibm-plugin
  • suse-upgrade-java-1_4_2-sun
  • suse-upgrade-java-1_4_2-sun-alsa
  • suse-upgrade-java-1_4_2-sun-demo
  • suse-upgrade-java-1_4_2-sun-devel
  • suse-upgrade-java-1_4_2-sun-jdbc
  • suse-upgrade-java-1_4_2-sun-plugin
  • suse-upgrade-java-1_4_2-sun-src
  • suse-upgrade-java-1_5_0-sun
  • suse-upgrade-java-1_5_0-sun-alsa
  • suse-upgrade-java-1_5_0-sun-demo
  • suse-upgrade-java-1_5_0-sun-devel
  • suse-upgrade-java-1_5_0-sun-jdbc
  • suse-upgrade-java-1_5_0-sun-plugin
  • suse-upgrade-java-1_5_0-sun-src
  • suse-upgrade-java-1_6_0-sun
  • suse-upgrade-java-1_6_0-sun-alsa
  • suse-upgrade-java-1_6_0-sun-demo
  • suse-upgrade-java-1_6_0-sun-devel
  • suse-upgrade-java-1_6_0-sun-jdbc
  • suse-upgrade-java-1_6_0-sun-plugin
  • suse-upgrade-java2
  • suse-upgrade-java2-jre
  • suse-upgrade-suse-release

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;