Bug 454605 - (CVE-2008-3111) CVE-2008-3111 Java Web Start Buffer overflow vulnerabilities (6557220)
CVE-2008-3111 Java Web Start Buffer overflow vulnerabilities (6557220)
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
http://sunsolve.sun.com/search/docume...
impact=critical,source=sunsolve,publi...
: Security
Depends On: 454632 454633 456880 456881 457470
Blocks:
  Show dependency treegraph
 
Reported: 2008-07-09 06:46 EDT by Marc Schoenefeld
Modified: 2010-12-20 17:01 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2010-12-20 17:01:45 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Marc Schoenefeld 2008-07-09 06:46:44 EDT
Sunalert, 238905, First Issue

Buffer overflow vulnerabilities in Java Web Start may allow an untrusted Java
Web Start application to elevate its privileges. For example, an untrusted Java
Web Start application may grant itself permissions to read and write local files
or execute local applications that are accessible to the user running the
untrusted application.
Comment 4 Vincent Danen 2010-12-20 17:01:45 EST
This issue has been corrected via:

Red Hat Enterprise Linux version 4 Extras (RHSA-2008:0595 (java-1.5.0-sun) and RHSA-2008:0790 (java-1.5.0-ibm))
RHEL Supplementary version 5 (RHSA-2008:0595 (java-1.5.0-sun) and RHSA-2008:0790 (java-1.5.0-ibm))
Red Hat Network Satellite Server 5.1 (RHEL v.4 AS) (RHSA-2008:0636 (java-1.5.0-sun) and RHSA-2008:0638 (java-1.5.0-ibm))

Note You need to log in before you can comment on or make changes to this bug.