National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2008-1188 Detail

Current Description

Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allow remote attackers to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka "The first two issues."

Source:  MITRE
View Analysis Description

Impact

CVSS v2.0 Severity and Metrics:

Base Score: 9.3 HIGH
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C) (V2 legend)
Impact Subscore: 10.0
Exploitability Subscore: 8.6


Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (AU): None
Confidentiality (C): Complete
Integrity (I): Complete
Availability (A): Complete
Additional Information:
Victim must voluntarily interact with attack mechanism
Provides administrator access
Allows unauthorized disclosure of information
Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html Mailing List Third Party Advisory
http://security.gentoo.org/glsa/glsa-200804-28.xml Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-233323-1 Patch Third Party Advisory
http://support.apple.com/kb/HT3178 Third Party Advisory
http://support.apple.com/kb/HT3179 Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0186.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0210.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0267.html Third Party Advisory
http://www.securitytracker.com/id?1019549 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-066A.html Third Party Advisory US Government Resource
http://www.vmware.com/security/advisories/VMSA-2008-0010.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/0770/references Third Party Advisory
http://www.vupen.com/english/advisories/2008/1856/references Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-009/ Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-08-010/ Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/41029 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/41133 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11209 Third Party Advisory

Technical Details

Vulnerability Type (View All)

  • Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)

Known Affected Software Configurations Switch to CPE 2.3

Configuration 1 ( hide )
 cpe:/a:sun:jdk:1.5.0:-
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update1
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update10
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update11
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update12
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update13
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update14
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update2
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update3
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update4
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update5
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update6
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update7
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update8
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.5.0:update9
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.6.0:-
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.6.0:update_3
     Show Matching CPE(s)
 cpe:/a:sun:jdk:1.6.0:update_4
     Show Matching CPE(s)

Configuration 2 ( hide )
 cpe:/a:sun:jre:1.5.0:-
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update1
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update10
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update11
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update12
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update13
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update14
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update2
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update3
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update4
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update5
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update6
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update7
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update8
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.5.0:update9
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.6.0:-
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.6.0:update_1
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.6.0:update_2
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.6.0:update_3
     Show Matching CPE(s)
 cpe:/a:sun:jre:1.6.0:update_4
     Show Matching CPE(s)


Change History

4 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2008-1188
NVD Published Date:
03/06/2008
NVD Last Modified:
07/31/2019