Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-1196

Опубликовано: 06 мар. 2008
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 6.8

Описание

Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

released

1.5.0-15-0ubuntu1
intrepid

released

1.5.0-15-0ubuntu1
jaunty

released

1.5.0-15-0ubuntu1
karmic

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

6-05-0ubuntu1
edgy

DNE

feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

released

6-05-0ubuntu1
intrepid

released

6-05-0ubuntu1
jaunty

released

6-05-0ubuntu1
karmic

released

6-05-0ubuntu1
upstream

needed

Показывать по

Ссылки на источники

EPSS

Процентиль: 97%
0.31252
Средний

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.

nvd
больше 17 лет назад

Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.

debian
больше 17 лет назад

Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK ...

github
больше 3 лет назад

Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.

EPSS

Процентиль: 97%
0.31252
Средний

6.8 Medium

CVSS2