Vulnerability Name: CVE-2008-3107 (CCN-43659) Assigned: 2008-07-08 Published: 2008-07-08 Updated: 2018-10-30 Summary: Unspecified vulnerability in the Virtual Machine in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-noinfo CWE-264 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2008-3107 Source: APPLE Type: UNKNOWNAPPLE-SA-2008-09-24 Source: SUSE Type: UNKNOWNSUSE-SA:2008:042 Source: BUGTRAQ Type: UNKNOWN20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and Source: CCN Type: RHSA-2008-0594Critical: java-1.6.0-sun security update Source: CCN Type: RHSA-2008-0595Critical: java-1.5.0-sun security update Source: CCN Type: RHSA-2008-0636Low: Red Hat Network Satellite Server Sun Java Runtime security update Source: CCN Type: SA31010Sun Java JDK / JRE Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory31010 Source: SECUNIA Type: UNKNOWN31055 Source: SECUNIA Type: UNKNOWN31497 Source: SECUNIA Type: UNKNOWN31600 Source: CCN Type: SA32018Mac OS X Java Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN32018 Source: CCN Type: SA32179VMware VirtualCenter Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN32179 Source: CCN Type: SA32180VMware ESX Server Sun Java JDK / JRE Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN32180 Source: SECUNIA Type: UNKNOWN37386 Source: GENTOO Type: UNKNOWNGLSA-200911-02 Source: CCN Type: SECTRACK ID: 1020455Java Runtime Environment (JRE) Virtual Machine Bug Lets Remote Users Access Files and Gain Privileges on the Target System Source: CCN Type: Sun Alert ID: 238967Security Vulnerability in the Java Runtime Environment Virtual Machine may allow an untrusted Application or Applet to Elevate Privileges Source: SUNALERT Type: UNKNOWN238967 Source: CCN Type: Apple Web siteAbout the security content of Java for Mac OS X 10.4, Release 7 Source: CONFIRM Type: UNKNOWNhttp://support.apple.com/kb/HT3178 Source: CONFIRM Type: UNKNOWNhttp://support.apple.com/kb/HT3179 Source: CCN Type: ASA-2008-303java-1.5.0-sun security update (RHSA-2008-0595) Source: CCN Type: ASA-2008-354Security Vulnerability in the Java Runtime Environment Virtual Machine may allow an untrusted Application or Applet to Elevate Privileges (Sun 238967) Source: REDHAT Type: UNKNOWNRHSA-2008:0594 Source: REDHAT Type: UNKNOWNRHSA-2008:0595 Source: BUGTRAQ Type: UNKNOWN20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues Source: BID Type: UNKNOWN30141 Source: CCN Type: BID-30141Sun Java Runtime Environment Virtual Machine Privilege Escalation Vulnerability Source: SECTRACK Type: UNKNOWN1020455 Source: CERT Type: US Government ResourceTA08-193A Source: CCN Type: VMSA-2008-0016VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues Source: CONFIRM Type: UNKNOWNhttp://www.vmware.com/security/advisories/VMSA-2008-0016.html Source: VUPEN Type: UNKNOWNADV-2008-2056 Source: VUPEN Type: UNKNOWNADV-2008-2740 Source: XF Type: UNKNOWNsun-virtualmachine-unauth-access(43659) Source: XF Type: UNKNOWNsun-virtualmachine-unauth-access(43659) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:10219 Source: SUSE Type: SUSE-SA:2008:042Sun Java security update Vulnerable Configuration: Configuration 1 :cpe:/a:sun:jdk:5.0:update_1:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_10:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_11:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_12:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_13:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_14:*:*:*:*:*:* OR cpe:/a:sun:jdk:*:update_15:*:*:*:*:*:* (Version <= 5.0) OR cpe:/a:sun:jdk:5.0:update_2:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_3:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_4:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_5:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_6:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_7:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_8:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_9:*:*:*:*:*:* OR cpe:/a:sun:jdk:6:update_1:*:*:*:*:*:* OR cpe:/a:sun:jdk:6:update_2:*:*:*:*:*:* OR cpe:/a:sun:jdk:6:update_3:*:*:*:*:*:* OR cpe:/a:sun:jdk:6:update_4:*:*:*:*:*:* OR cpe:/a:sun:jdk:6:update_5:*:*:*:*:*:* OR cpe:/a:sun:jdk:*:update_6:*:*:*:*:*:* (Version <= 6) OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_01:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_02:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_03:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_3:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_04:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_05:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_06:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_07:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_13:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_14:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_15:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_16:*:*:*:*:*:*:* OR cpe:/a:sun:jre:*:*:*:*:*:*:*:* (Version <= 1.4.2_17) OR cpe:/a:sun:jre:5.0:update_1:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_10:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_11:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_12:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_13:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_14:*:*:*:*:*:* OR cpe:/a:sun:jre:*:update_15:*:*:*:*:*:* (Version <= 5.0) OR cpe:/a:sun:jre:5.0:update_2:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_3:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_4:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_5:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_6:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_7:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_8:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_9:*:*:*:*:*:* OR cpe:/a:sun:jre:6:update_1:*:*:*:*:*:* OR cpe:/a:sun:jre:6:update_2:*:*:*:*:*:* OR cpe:/a:sun:jre:6:update_3:*:*:*:*:*:* OR cpe:/a:sun:jre:6:update_4:*:*:*:*:*:* OR cpe:/a:sun:jre:6:update_5:*:*:*:*:*:* OR cpe:/a:sun:jre:*:update_6:*:*:*:*:*:* (Version <= 6) OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_03:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_13:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_14:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_15:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_16:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:*:*:*:*:*:*:*:* (Version <= 1.4.2_17) Configuration RedHat 1 :cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update10:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update11:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update9:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update10:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update11:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_13:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_14:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update12:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update8:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update9:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update1:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update2:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update3:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update4:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update5:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update12:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update13:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_03:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_15:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update15:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update15:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update17:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_17:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update14:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update14:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_16:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update16:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_07:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update13:*:*:*:*:*:* AND cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.3:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.4:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0.2:*:*:*:*:*:*:* OR cpe:/a:vmware:esx_server:3.5:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.0:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.2:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.5:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.6:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.2:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.2:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.4:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.5:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.2:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.4:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.5:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:* OR cpe:/a:vmware:esx_server:3.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.6:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.7:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.4:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.6:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0.4:*:*:*:*:*:*:* OR cpe:/a:vmware:virtualcenter:2.5:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20083107 V CVE-2008-3107 2015-11-16 oval:org.mitre.oval:def:22640 P ELSA-2008:0595: java-1.5.0-sun security update (Critical) 2014-05-26 oval:org.mitre.oval:def:22389 P ELSA-2008:0594: java-1.6.0-sun security update (Critical) 2014-05-26 oval:org.mitre.oval:def:10219 V Unspecified vulnerability in the Virtual Machine in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs. 2010-09-06 oval:com.redhat.rhsa:def:20080594 P RHSA-2008:0594: java-1.6.0-sun security update (Critical) 2008-07-14 oval:com.redhat.rhsa:def:20080595 P RHSA-2008:0595: java-1.5.0-sun security update (Critical) 2008-07-14
BACK
sun jdk 5.0 update_1
sun jdk 5.0 update_10
sun jdk 5.0 update_11
sun jdk 5.0 update_12
sun jdk 5.0 update_13
sun jdk 5.0 update_14
sun jdk * update_15
sun jdk 5.0 update_2
sun jdk 5.0 update_3
sun jdk 5.0 update_4
sun jdk 5.0 update_5
sun jdk 5.0 update_6
sun jdk 5.0 update_7
sun jdk 5.0 update_8
sun jdk 5.0 update_9
sun jdk 6 update_1
sun jdk 6 update_2
sun jdk 6 update_3
sun jdk 6 update_4
sun jdk 6 update_5
sun jdk * update_6
sun jre 1.4.2
sun jre 1.4.2_01
sun jre 1.4.2_02
sun jre 1.4.2_03
sun jre 1.4.2_3
sun jre 1.4.2_04
sun jre 1.4.2_05
sun jre 1.4.2_06
sun jre 1.4.2_07
sun jre 1.4.2_8
sun jre 1.4.2_9
sun jre 1.4.2_10
sun jre 1.4.2_11
sun jre 1.4.2_12
sun jre 1.4.2_13
sun jre 1.4.2_14
sun jre 1.4.2_15
sun jre 1.4.2_16
sun jre *
sun jre 5.0 update_1
sun jre 5.0 update_10
sun jre 5.0 update_11
sun jre 5.0 update_12
sun jre 5.0 update_13
sun jre 5.0 update_14
sun jre * update_15
sun jre 5.0 update_2
sun jre 5.0 update_3
sun jre 5.0 update_4
sun jre 5.0 update_5
sun jre 5.0 update_6
sun jre 5.0 update_7
sun jre 5.0 update_8
sun jre 5.0 update_9
sun jre 6 update_1
sun jre 6 update_2
sun jre 6 update_3
sun jre 6 update_4
sun jre 6 update_5
sun jre * update_6
sun sdk 1.4.2_02
sun sdk 1.4.2_03
sun sdk 1.4.2_04
sun sdk 1.4.2_05
sun sdk 1.4.2_06
sun sdk 1.4.2_07
sun sdk 1.4.2_08
sun sdk 1.4.2_09
sun sdk 1.4.2_10
sun sdk 1.4.2_11
sun sdk 1.4.2_12
sun sdk 1.4.2_13
sun sdk 1.4.2_14
sun sdk 1.4.2_15
sun sdk 1.4.2_16
sun sdk *
sun jre 1.4.2
sun jre 1.5.0 update3
sun jdk 1.5.0 update10
sun jdk 1.5.0 update11
sun jre 1.5.0 update7
sun jre 1.5.0 update8
sun jre 1.5.0 update9
sun jre 1.5.0 update10
sun jre 1.5.0 update11
sun sdk 1.4.2_11
sun sdk 1.4.2_12
sun sdk 1.4.2_13
sun sdk 1.4.2_14
sun jdk 1.5.0 update1
sun jdk 1.5.0 update12
sun jdk 1.5.0 update2
sun jdk 1.5.0 update3
sun jdk 1.5.0 update4
sun jdk 1.5.0 update5
sun jdk 1.5.0 update6
sun jdk 1.5.0 update7
sun jdk 1.5.0 update8
sun jdk 1.5.0 update9
sun jdk 1.6.0 update1
sun jdk 1.6.0 update2
sun jre 1.4.2 update1
sun jre 1.4.2 update2
sun jre 1.4.2 update3
sun jre 1.4.2 update4
sun jre 1.4.2 update5
sun jre 1.5.0 update1
sun jre 1.5.0 update12
sun jre 1.5.0 update13
sun jre 1.5.0 update2
sun jre 1.5.0 update4
sun jre 1.5.0 update5
sun jre 1.5.0 update6
sun sdk 1.4.2_03
sun sdk 1.4.2_08
sun sdk 1.4.2_09
sun sdk 1.4.2_10
sun sdk 1.4.2_15
sun jre 1.6.0 update6
sun jre 1.5.0 update15
sun jdk 1.5.0 update15
sun jre 1.4.2 update17
sun sdk 1.4.2_17
sun jdk 1.6.0 update3
sun jdk 1.6.0 update4
sun jdk 1.6.0 update5
sun jdk 1.6.0 update6
sun jre 1.6.0 update4
sun jre 1.6.0 update5
sun jdk 1.5.0 update14
sun jre 1.5.0 update14
sun sdk 1.4.2_04
sun sdk 1.4.2_02
sun sdk 1.4.2_16
sun jre 1.4.2 update16
sun sdk 1.4.2_05
sun sdk 1.4.2_06
sun sdk 1.4.2_07
sun jdk 1.5.0 update13
novell linux desktop 9
apple mac os x 10.4
apple mac os x 10.4.1
apple mac os x server 10.4.1
apple mac os x server 10.4
apple mac os x server 10.4.2
apple mac os x 10.4.2
apple mac os x 10.4.4
apple mac os x 10.4.3
apple mac os x server 10.4.3
apple mac os x server 10.4.4
apple mac os x 10.4.5
apple mac os x server 10.4.5
apple mac os x 10.4.6
redhat rhel extras 4
apple mac os x server 10.4.6
apple mac os x 10.4.7
apple mac os x server 10.4.7
vmware workstation 5.5.1
apple mac os x server 10.4.8
apple mac os x 10.4.8
apple mac os x server 10.4.9
apple mac os x 10.4.9
vmware workstation 6.0
apple mac os x 10.4.10
apple mac os x server 10.4.10
apple mac os x 10.5
apple mac os x server 10.5
apple mac os x 10.5.1
apple mac os x server 10.5.1
apple mac os x 10.5.2
vmware ace 2.0
apple mac os x server 10.5.2
novell open enterprise server *
vmware ace 1.0
vmware ace 1.0.3
vmware server 1.0.3
vmware workstation 5.5
vmware workstation 5.5.3
vmware workstation 5.5.4
novell opensuse 10.2
novell opensuse 10.3
vmware ace 2.0.3
vmware ace 2.0.1
vmware ace 2.0.2
vmware esx server 3.5
vmware server 1.0
vmware workstation 5.5.0
vmware workstation 5.5.2
vmware workstation 5.5.5
vmware workstation 5.5.6
vmware workstation 6.0.1
vmware workstation 6.0.2
vmware workstation 6.0.3
vmware ace 1.0.1
vmware ace 1.0.2
vmware ace 1.0.4
vmware ace 1.0.5
vmware server 1.0.1
vmware server 1.0.2
vmware server 1.0.4
vmware server 1.0.5
novell opensuse 11.0
novell suse linux enterprise server 10 sp2
apple mac os x server 10.5.3
apple mac os x 10.5.3
vmware esx server 3.0.3
vmware server 1.0.6
vmware workstation 5.5.7
vmware workstation 6.0.4
vmware ace 1.0.6
vmware ace 2.0.4
vmware virtualcenter 2.5