CVE-2008-1187

Unspecified vulnerability in Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to cause a denial of service (JRE crash) and possibly execute arbitrary code via unknown vectors related to XSLT transforms.
References
Link Resource
http://dev2dev.bea.com/pub/advisory/277
http://download.novell.com/Download?buildid=q5exhSqeBjA~ Patch
http://jvn.jp/en/jp/JVN04032535/index.html
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000016.html
http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
http://secunia.com/advisories/29239 Vendor Advisory
http://secunia.com/advisories/29273 Vendor Advisory
http://secunia.com/advisories/29498 Vendor Advisory
http://secunia.com/advisories/29582 Vendor Advisory
http://secunia.com/advisories/29841 Vendor Advisory
http://secunia.com/advisories/29858 Vendor Advisory
http://secunia.com/advisories/29897 Vendor Advisory
http://secunia.com/advisories/29999 Vendor Advisory
http://secunia.com/advisories/30003 Vendor Advisory
http://secunia.com/advisories/30676 Vendor Advisory
http://secunia.com/advisories/30780 Vendor Advisory
http://secunia.com/advisories/31067 Vendor Advisory
http://secunia.com/advisories/31497 Vendor Advisory
http://secunia.com/advisories/31580 Vendor Advisory
http://secunia.com/advisories/31586 Vendor Advisory
http://secunia.com/advisories/32018 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200804-28.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-26-233322-1 Patch Vendor Advisory
http://support.apple.com/kb/HT3178
http://support.apple.com/kb/HT3179
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5033642.html
http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml
http://www.redhat.com/support/errata/RHSA-2008-0186.html
http://www.redhat.com/support/errata/RHSA-2008-0210.html
http://www.redhat.com/support/errata/RHSA-2008-0243.html
http://www.redhat.com/support/errata/RHSA-2008-0244.html
http://www.redhat.com/support/errata/RHSA-2008-0245.html
http://www.redhat.com/support/errata/RHSA-2008-0267.html
http://www.redhat.com/support/errata/RHSA-2008-0555.html
http://www.securitytracker.com/id?1019548
http://www.us-cert.gov/cas/techalerts/TA08-066A.html US Government Resource
http://www.vmware.com/security/advisories/VMSA-2008-0010.html Patch
http://www.vupen.com/english/advisories/2008/0770/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/1252 Vendor Advisory
http://www.vupen.com/english/advisories/2008/1856/references Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41025
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10278
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sun:jdk:*:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:*:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:*:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:*:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*

History

No history.

Information

Published : 2008-03-06 21:44

Updated : 2023-12-10 10:40


NVD link : CVE-2008-1187

Mitre link : CVE-2008-1187

CVE.ORG link : CVE-2008-1187


JSON object : View

Products Affected

sun

  • sdk
  • jdk
  • jre
CWE
CWE-264

Permissions, Privileges, and Access Controls

NVD-CWE-noinfo