CVE-2008-5344
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/12/2008
Last modified:
09/04/2025
Description
Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applets to read arbitrary files and make unauthorized network connections via unknown vectors related to applet classloading, aka 6716217.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sun:jdk:*:update_16:*:*:*:*:*:* | 5.0 (including) | |
| cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:* | 6 (including) | |
| cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
- http://marc.info/?l=bugtraq&m=123678756409861&w=2
- http://marc.info/?l=bugtraq&m=123678756409861&w=2
- http://marc.info/?l=bugtraq&m=126583436323697&w=2
- http://marc.info/?l=bugtraq&m=126583436323697&w=2
- http://osvdb.org/50513
- http://rhn.redhat.com/errata/RHSA-2008-1018.html
- http://rhn.redhat.com/errata/RHSA-2008-1025.html
- http://secunia.com/advisories/32991
- http://secunia.com/advisories/33015
- http://secunia.com/advisories/33528
- http://secunia.com/advisories/33710
- http://secunia.com/advisories/34233
- http://secunia.com/advisories/34605
- http://secunia.com/advisories/34889
- http://secunia.com/advisories/35065
- http://secunia.com/advisories/37386
- http://secunia.com/advisories/38539
- http://security.gentoo.org/glsa/glsa-200911-02.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-244988-1
- http://support.avaya.com/elmodocs2/security/ASA-2008-486.htm
- http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=
- http://www.redhat.com/support/errata/RHSA-2009-0015.html
- http://www.redhat.com/support/errata/RHSA-2009-0016.html
- http://www.redhat.com/support/errata/RHSA-2009-0445.html
- http://www.us-cert.gov/cas/techalerts/TA08-340A.html
- http://www.vupen.com/english/advisories/2008/3339
- http://www.vupen.com/english/advisories/2009/0672
- http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47057
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6249
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
- http://marc.info/?l=bugtraq&m=123678756409861&w=2
- http://marc.info/?l=bugtraq&m=123678756409861&w=2
- http://marc.info/?l=bugtraq&m=126583436323697&w=2
- http://marc.info/?l=bugtraq&m=126583436323697&w=2
- http://osvdb.org/50513
- http://rhn.redhat.com/errata/RHSA-2008-1018.html
- http://rhn.redhat.com/errata/RHSA-2008-1025.html
- http://secunia.com/advisories/32991
- http://secunia.com/advisories/33015
- http://secunia.com/advisories/33528
- http://secunia.com/advisories/33710
- http://secunia.com/advisories/34233
- http://secunia.com/advisories/34605
- http://secunia.com/advisories/34889
- http://secunia.com/advisories/35065
- http://secunia.com/advisories/37386
- http://secunia.com/advisories/38539
- http://security.gentoo.org/glsa/glsa-200911-02.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-244988-1
- http://support.avaya.com/elmodocs2/security/ASA-2008-486.htm
- http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=
- http://www.redhat.com/support/errata/RHSA-2009-0015.html
- http://www.redhat.com/support/errata/RHSA-2009-0016.html
- http://www.redhat.com/support/errata/RHSA-2009-0445.html
- http://www.us-cert.gov/cas/techalerts/TA08-340A.html
- http://www.vupen.com/english/advisories/2008/3339
- http://www.vupen.com/english/advisories/2009/0672
- http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47057
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6249



