CVE-2008-3111

N/A Unknown
Published: July 09, 2008 Modified: April 23, 2026
View on NVD

Description

Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/31010
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31055
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31320
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31497
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31600
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32018
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32179
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32180
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/37386
Source: cve@mitre.org
Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA08-193A.html
Source: cve@mitre.org
US Government Resource
http://www.vupen.com/english/advisories/2008/2740
Source: cve@mitre.org
Vendor Advisory
http://marc.info/?l=bugtraq&m=122331139823057&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31010
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31055
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31320
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31497
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31600
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31736
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32018
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/32179
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/32180
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37386
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200911-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://support.apple.com/kb/HT3178
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT3179
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0595.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0790.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/494505/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/497041/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/30148
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1020452
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA08-193A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vmware.com/security/advisories/VMSA-2008-0016.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/2056/references
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/2740
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-043/
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/43664
Source: af854a3a-2127-422b-91ae-364da2661108

64 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

sun