CVE-2008-2086
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
05/12/2008
Last modified:
23/04/2026
Description
Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka "Java Web Start File Inclusion" and CR 6694892.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sun:jdk:*:update_16:*:*:*:*:*:* | 5.0 (including) | |
| cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:* | 6 (including) | |
| cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
- http://marc.info/?l=bugtraq&m=123678756409861&w=2
- http://marc.info/?l=bugtraq&m=126583436323697&w=2
- http://osvdb.org/50510
- http://rhn.redhat.com/errata/RHSA-2008-1025.html
- http://secunia.com/advisories/32991
- http://secunia.com/advisories/33015
- http://secunia.com/advisories/33528
- http://secunia.com/advisories/33710
- http://secunia.com/advisories/34233
- http://secunia.com/advisories/34605
- http://secunia.com/advisories/34889
- http://secunia.com/advisories/35065
- http://secunia.com/advisories/37386
- http://secunia.com/advisories/38539
- http://security.gentoo.org/glsa/glsa-200911-02.xml
- http://securityreason.com/securityalert/4693
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-244988-1
- http://support.avaya.com/elmodocs2/security/ASA-2008-486.htm
- http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=
- http://www.redhat.com/support/errata/RHSA-2008-1018.html
- http://www.redhat.com/support/errata/RHSA-2009-0015.html
- http://www.redhat.com/support/errata/RHSA-2009-0016.html
- http://www.redhat.com/support/errata/RHSA-2009-0445.html
- http://www.securityfocus.com/archive/1/498907/100/0/threaded
- http://www.securityfocus.com/bid/32620
- http://www.securitytracker.com/id?1021318
- http://www.us-cert.gov/cas/techalerts/TA08-340A.html
- http://www.vsecurity.com/bulletins/advisories/2008/JWS-props.txt
- http://www.vupen.com/english/advisories/2009/0424
- http://www.vupen.com/english/advisories/2009/0672
- http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5601
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
- http://marc.info/?l=bugtraq&m=123678756409861&w=2
- http://marc.info/?l=bugtraq&m=126583436323697&w=2
- http://osvdb.org/50510
- http://rhn.redhat.com/errata/RHSA-2008-1025.html
- http://secunia.com/advisories/32991
- http://secunia.com/advisories/33015
- http://secunia.com/advisories/33528
- http://secunia.com/advisories/33710
- http://secunia.com/advisories/34233
- http://secunia.com/advisories/34605
- http://secunia.com/advisories/34889
- http://secunia.com/advisories/35065
- http://secunia.com/advisories/37386
- http://secunia.com/advisories/38539
- http://security.gentoo.org/glsa/glsa-200911-02.xml
- http://securityreason.com/securityalert/4693
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-244988-1
- http://support.avaya.com/elmodocs2/security/ASA-2008-486.htm
- http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=
- http://www.redhat.com/support/errata/RHSA-2008-1018.html
- http://www.redhat.com/support/errata/RHSA-2009-0015.html
- http://www.redhat.com/support/errata/RHSA-2009-0016.html
- http://www.redhat.com/support/errata/RHSA-2009-0445.html
- http://www.securityfocus.com/archive/1/498907/100/0/threaded
- http://www.securityfocus.com/bid/32620
- http://www.securitytracker.com/id?1021318
- http://www.us-cert.gov/cas/techalerts/TA08-340A.html
- http://www.vsecurity.com/bulletins/advisories/2008/JWS-props.txt
- http://www.vupen.com/english/advisories/2009/0424
- http://www.vupen.com/english/advisories/2009/0672
- http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5601



