Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2008-3105
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Unspecified vulnerability in the JAX-WS client and service in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier allows remote attackers to access URLs or cause a denial of service via unknown vectors involving "processing of XML data" by a trusted application..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 8.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 8.5/10
- Confidentiality Impact
- Partial
- Availability Impact
- Complete
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-238628-1
- http://www.securityfocus.com/bid/30143
- http://secunia.com/advisories/31010
- http://www.us-cert.gov/cas/techalerts/TA08-193A.html
- http://www.redhat.com/support/errata/RHSA-2008-0594.html
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
- http://secunia.com/advisories/31600
- http://support.apple.com/kb/HT3179
- http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html
- http://secunia.com/advisories/32018
- http://secunia.com/advisories/32180
- http://www.vmware.com/security/advisories/VMSA-2008-0016.html
- http://secunia.com/advisories/32179
- http://marc.info/?l=bugtraq&m=122331139823057&w=2
- http://secunia.com/advisories/32436
- http://www.securitytracker.com/id?1020457
- http://secunia.com/advisories/33237
- http://secunia.com/advisories/33238
- http://www.redhat.com/support/errata/RHSA-2008-1045.html
- http://www.redhat.com/support/errata/RHSA-2008-1044.html
- http://www.redhat.com/support/errata/RHSA-2008-0906.html
- http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717
- http://support.avaya.com/elmodocs2/security/ASA-2008-299.htm
- http://support.avaya.com/elmodocs2/security/ASA-2008-428.htm
- http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014
- http://security.gentoo.org/glsa/glsa-200911-02.xml
- http://secunia.com/advisories/37386
- http://www.vupen.com/english/advisories/2008/2056/references
- http://www.vupen.com/english/advisories/2008/2740
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43657
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43654
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1
- http://www.securityfocus.com/archive/1/497041/100/0/threaded