ID CVE-2008-5357
Summary Integer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file, which triggers a heap-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:-:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:-:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:-:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:-:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:-:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:-:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 09-10-2019 - 22:56)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
oval via4
accepted 2010-01-11T04:01:46.526-05:00
class vulnerability
contributors
name Michael Wood
organization Hewlett-Packard
definition_extensions
comment VMware ESX Server 3.5.0 is installed
oval oval:org.mitre.oval:def:5887
description Integer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file, which triggers a heap-based buffer overflow.
family unix
id oval:org.mitre.oval:def:6505
status accepted
submitted 2009-09-23T15:39:02.000-04:00
title Sun Java Runtime Environment TrueType font integer overflow
version 4
redhat via4
advisories
  • rhsa
    id RHSA-2008:1018
  • rhsa
    id RHSA-2008:1025
  • rhsa
    id RHSA-2009:0016
  • rhsa
    id RHSA-2009:0369
  • rhsa
    id RHSA-2009:0466
refmap via4
bid 32608
cert TA08-340A
confirm
gentoo GLSA-200911-02
hp
  • HPSBMA02486
  • HPSBUX02411
  • SSRT080111
  • SSRT090049
idefense 20081204 Sun Java JRE TrueType Font Parsing Integer Overflow Vulnerability
osvdb 50517
secunia
  • 32991
  • 33015
  • 33187
  • 33710
  • 34233
  • 34259
  • 34447
  • 34605
  • 34972
  • 35065
  • 37386
  • 38539
sunalert 244987
suse
  • SUSE-SA:2009:007
  • SUSE-SA:2009:018
  • SUSE-SR:2009:006
  • SUSE-SR:2009:010
vupen
  • ADV-2008-3339
  • ADV-2009-0672
xf jre-font-privilege-escalation(47050)
saint via4
bid 32608
description Java Runtime Environment JAR manifest Main Class buffer overflow
id web_client_jre,web_dev_jdk
osvdb 50499
title jre_manifest_main_class
type client
Last major update 09-10-2019 - 22:56
Published 05-12-2008 - 11:30
Back to Top