Vulnerability Details : CVE-2008-3103
Unspecified vulnerability in the Java Management Extensions (JMX) management agent in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier, when local monitoring is enabled, allows remote attackers to "perform unauthorized operations" via unspecified vectors.
Exploit prediction scoring system (EPSS) score for CVE-2008-3103
Probability of exploitation activity in the next 30 days: 2.50%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-3103
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-3103
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3103
-
http://www.securityfocus.com/bid/30146
- http://www.vmware.com/security/advisories/VMSA-2008-0016.html
- https://rhn.redhat.com/errata/RHSA-2009-0466.html
- http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10920
-
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238965-1
Patch
-
http://www.redhat.com/support/errata/RHSA-2008-0891.html
- http://www.redhat.com/support/errata/RHSA-2008-1044.html
- http://www.vupen.com/english/advisories/2008/2056/references
- http://www.redhat.com/support/errata/RHSA-2008-0594.html
-
http://support.apple.com/kb/HT3179
About the security content of Java for Mac OS X 10.5 Update 2 - Apple Support
- http://www.redhat.com/support/errata/RHSA-2008-1045.html
- http://www.redhat.com/support/errata/RHSA-2008-0595.html
- http://support.avaya.com/elmodocs2/security/ASA-2008-428.htm
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
- http://marc.info/?l=bugtraq&m=122331139823057&w=2
- http://www.vupen.com/english/advisories/2008/2740
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/43669
-
http://www.us-cert.gov/cas/techalerts/TA08-193A.html
US Government Resource
- http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm
- http://security.gentoo.org/glsa/glsa-200911-02.xml
-
http://www.securitytracker.com/id?1020458
- http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html
- http://www.redhat.com/support/errata/RHSA-2008-0906.html
-
http://support.apple.com/kb/HT3178
About the security content of Java for Mac OS X 10.4, Release 7 - Apple Support
- http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
- http://www.securityfocus.com/archive/1/497041/100/0/threaded
Products affected by CVE-2008-3103
- cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:*:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*