CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2008-3115

Secure Static Versioning in Sun Java JDK and JRE 6 Update 6 and earlier, and 5.0 Update 6 through 15, does not properly prevent execution of applets on older JRE releases, which might allow remote attackers to exploit vulnerabilities in these older releases.
Publish Date : 2008-07-09 Last Update Date : 2017-08-07
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
7.5
Confidentiality Impact Partial (There is considerable informational disclosure.)
Integrity Impact Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact Partial (There is reduced performance or interruptions in resource availability.)
Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s)
CWE ID 16

- Related OVAL Definitions

Title Definition Id Class Family
CVE-2008-3115 oval:org.opensuse.security:def:20083115 unix
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.

- Products Affected By CVE-2008-3115

# Product Type Vendor Product Version Update Edition Language
1 Application SUN JDK 5.0 Update 15 Version Details Vulnerabilities
2 Application SUN JDK 5.0 Update 10 Version Details Vulnerabilities
3 Application SUN JDK 5.0 Update 6 Version Details Vulnerabilities
4 Application SUN JDK 5.0 Update 11 Version Details Vulnerabilities
5 Application SUN JDK 5.0 Update 7 Version Details Vulnerabilities
6 Application SUN JDK 5.0 Update 12 Version Details Vulnerabilities
7 Application SUN JDK 5.0 Update 8 Version Details Vulnerabilities
8 Application SUN JDK 5.0 Update 13 Version Details Vulnerabilities
9 Application SUN JDK 5.0 Update 9 Version Details Vulnerabilities
10 Application SUN JDK 5.0 Update 14 Version Details Vulnerabilities
11 Application SUN JDK 6 Update 2 Version Details Vulnerabilities
12 Application SUN JDK 6 Update 3 Version Details Vulnerabilities
13 Application SUN JDK 6 Update 4 Version Details Vulnerabilities
14 Application SUN JDK 6 Update 6 Version Details Vulnerabilities
15 Application SUN JDK 6 Update 5 Version Details Vulnerabilities
16 Application SUN JDK 6 Update 1 Version Details Vulnerabilities
17 Application SUN JRE 5.0 Update 6 Version Details Vulnerabilities
18 Application SUN JRE 5.0 Update 11 Version Details Vulnerabilities
19 Application SUN JRE 5.0 Update 7 Version Details Vulnerabilities
20 Application SUN JRE 5.0 Update 12 Version Details Vulnerabilities
21 Application SUN JRE 5.0 Update 8 Version Details Vulnerabilities
22 Application SUN JRE 5.0 Update 13 Version Details Vulnerabilities
23 Application SUN JRE 5.0 Update 9 Version Details Vulnerabilities
24 Application SUN JRE 5.0 Update 14 Version Details Vulnerabilities
25 Application SUN JRE 5.0 Update 15 Version Details Vulnerabilities
26 Application SUN JRE 5.0 Update 10 Version Details Vulnerabilities
27 Application SUN JRE 6 Update 3 Version Details Vulnerabilities
28 Application SUN JRE 6 Update 4 Version Details Vulnerabilities
29 Application SUN JRE 6 Update 5 Version Details Vulnerabilities
30 Application SUN JRE 6 Update 1 Version Details Vulnerabilities
31 Application SUN JRE 6 Update 6 Version Details Vulnerabilities
32 Application SUN JRE 6 Update 2 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
SUN JDK 16
SUN JRE 16

- References For CVE-2008-3115

http://www.us-cert.gov/cas/techalerts/TA08-193A.html
CERT TA08-193A
http://www.vmware.com/security/advisories/VMSA-2008-0016.html CONFIRM
http://www.vupen.com/english/advisories/2008/2740
VUPEN ADV-2008-2740
https://exchange.xforce.ibmcloud.com/vulnerabilities/43665
XF sun-securestatic-weak-security(43665)
http://www.vupen.com/english/advisories/2008/2056/references
VUPEN ADV-2008-2056
http://www.securitytracker.com/id?1020460
SECTRACK 1020460
http://support.apple.com/kb/HT3178 CONFIRM
http://www.securityfocus.com/bid/30142
BID 30142 Sun Java SE Secure Static Versioning Applet Execution Weakness Release Date:2009-11-18
http://www.securityfocus.com/archive/1/archive/1/497041/100/0/threaded
BUGTRAQ 20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues
http://support.apple.com/kb/HT3179 CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238966-1
SUNALERT 238966
http://security.gentoo.org/glsa/glsa-200911-02.xml
GENTOO GLSA-200911-02
http://marc.info/?l=bugtraq&m=122331139823057&w=2
BUGTRAQ 20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
SUSE SUSE-SA:2008:042
http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
APPLE APPLE-SA-2008-09-24

- Metasploit Modules Related To CVE-2008-3115

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.