CVE-2008-1195

Properties

Published:
05.03.2008
Updated:
21.08.2010
Patch available:
Severity:
High
CVSS vector:
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Product:
sun: jre
sun: jre
sun: jre

Vulnerability description

Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.

References:

CERT: http://www.us-cert.gov/cas/techalerts/TA08-087A.html
CERT: http://www.us-cert.gov/cas/techalerts/TA08-066A.html
XF: http://xforce.iss.net/xforce/xfdb/41030
CONFIRM: http://www.vmware.com/security/advisories/VMSA-2008-0010.html
UBUNTU: http://www.ubuntu.com/usn/usn-592-1
SECTRACK: http://www.securitytracker.com/id?1019553
BUGTRAQ: http://www.securityfocus.com/archive/1/archive/1/490196/100/0/threaded
REDHAT: http://www.redhat.com/support/errata/RHSA-2008-0267.html
REDHAT: http://www.redhat.com/support/errata/RHSA-2008-0210.html
REDHAT: http://www.redhat.com/support/errata/RHSA-2008-0186.html
CONFIRM: http://www.mozilla.org/security/announce/2008/mfsa2008-18.html
MANDRIVA: http://www.mandriva.com/security/advisories?name=MDVSA-2008:080
GENTOO: http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml
GENTOO: http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
VUPEN: http://www.frsirt.com/english/advisories/2008/1856/references
VUPEN: http://www.frsirt.com/english/advisories/2008/1793/references
VUPEN: http://www.frsirt.com/english/advisories/2008/0998/references
VUPEN: http://www.frsirt.com/english/advisories/2008/0770/references
CONFIRM: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128
CONFIRM: http://support.apple.com/kb/HT3179
CONFIRM: http://support.apple.com/kb/HT3178
SUNALERT: http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
SUNALERT: http://sunsolve.sun.com/search/document.do?assetkey=1-26-233326-1
GENTOO: http://security.gentoo.org/glsa/glsa-200804-28.xml
SECUNIA: http://secunia.com/advisories/32018
SECUNIA: http://secunia.com/advisories/31497
SECUNIA: http://secunia.com/advisories/30780
SECUNIA: http://secunia.com/advisories/30676
SECUNIA: http://secunia.com/advisories/30620
SECUNIA: http://secunia.com/advisories/29897
SECUNIA: http://secunia.com/advisories/29858
SECUNIA: http://secunia.com/advisories/29645
SECUNIA: http://secunia.com/advisories/29582
SECUNIA: http://secunia.com/advisories/29560
SECUNIA: http://secunia.com/advisories/29547
SECUNIA: http://secunia.com/advisories/29541
SECUNIA: http://secunia.com/advisories/29526
SECUNIA: http://secunia.com/advisories/29498
SECUNIA: http://secunia.com/advisories/29273
SECUNIA: http://secunia.com/advisories/29239
OVAL: http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9486
SUSE: http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
SUSE: http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html
SUSE: http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html
APPLE: http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html