Vulnerability Details : CVE-2005-3905
Unspecified vulnerability in reflection APIs in Java SDK and JRE 1.3.1_15 and earlier, 1.4.2_08 and earlier, and JDK and JRE 5.0 Update 3 and earlier allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors, a different vulnerability than CVE-2005-3906. NOTE: this is associated with the "first issue" identified in SUNALERT:102003.
Products affected by CVE-2005-3905
- cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_02:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_02:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_04:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_01:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3_02:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_05:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_02:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_02:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_05:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_05:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3_05:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_02:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_02:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_06:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_06:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_03:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1_03:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1_03:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_03:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_03:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_02:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_02:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_4:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1_02:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1_02:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_03:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_05:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_05:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_07:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_07:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_4:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_4:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1_01:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1_02:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_01:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_04:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_05:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_06:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_07:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_03:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_03:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1_01:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1_01:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.1_03:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_04:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_04:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0_03:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0_03:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0_03:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_09:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_08:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_09:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_11:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_11:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_14:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_14:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_10:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_10:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_12:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_13:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_13:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_15:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_08:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_09:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_12:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_12:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_15:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_15:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_08:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.2_08:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_08:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_08:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_10:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_11:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_13:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_14:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update8:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update15:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update4:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-3905
11.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-3905
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-3905
-
http://www.gentoo.org/security/en/glsa/glsa-200601-10.xml
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/23251
-
http://www.kb.cert.org/vuls/id/974188
US Government Resource
-
http://www.vupen.com/english/advisories/2005/2946
Vendor Advisory
-
http://www.vupen.com/english/advisories/2005/2675
Vendor Advisory
-
http://www-1.ibm.com/support/docview.wss?uid=swg21225628
-
http://securitytracker.com/id?1015280
-
http://www.securityfocus.com/bid/15615
-
http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1
Patch;Vendor Advisory
-
http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html
-
http://www.vupen.com/english/advisories/2005/2636
Vendor Advisory
Jump to