Vulnerability Details : CVE-2008-3637
The Hash-based Message Authentication Code (HMAC) provider in Java on Apple Mac OS X 10.4.11, 10.5.4, and 10.5.5 uses an uninitialized variable, which allows remote attackers to execute arbitrary code via a crafted applet, related to an "error checking issue."
Vulnerability category: Execute code
Products affected by CVE-2008-3637
- cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-3637
11.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-3637
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | 2024-02-15 |
CWE ids for CVE-2008-3637
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
-
The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3637
-
http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html
Mailing List
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/45396
Java on Apple Mac OS X HMAC code execution CVE-2008-3637 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/31379
Broken Link;Third Party Advisory;VDB Entry
-
http://support.apple.com/kb/HT3179
About the security content of Java for Mac OS X 10.5 Update 2 - Apple SupportVendor Advisory
-
http://secunia.com/advisories/32018
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://www.securitytracker.com/id?1020943
GoDaddy Domain Name SearchBroken Link;Third Party Advisory;VDB Entry
-
http://support.apple.com/kb/HT3178
About the security content of Java for Mac OS X 10.4, Release 7 - Apple SupportVendor Advisory
-
http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
Mailing List
Jump to