First published: Wed Feb 06 2008(Updated: )
The XML parsing code in Sun Java Runtime Environment JDK and JRE 6 Update 3 and earlier processes external entity references even when the "external general entities" property is false, which allows remote attackers to conduct XML external entity (XXE) attacks and cause a denial of service or access restricted resources.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Java Development Kit (JDK) | =1.6 | |
Sun Java Runtime Environment (JRE) | <=1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0628 is classified as a high severity vulnerability due to its potential to allow remote attackers to exploit XML external entity (XXE) attacks.
To fix CVE-2008-0628, upgrade the Java Runtime Environment or Java Development Kit to a version later than JDK 6 Update 3.
CVE-2008-0628 facilitates XML external entity (XXE) attacks, which can lead to denial of service or unauthorized access to sensitive data.
CVE-2008-0628 affects Sun Java Runtime Environment JDK and JRE 6 Update 3 and earlier versions.
Exploiting CVE-2008-0628 can lead to a denial of service attack or unauthorized access to resources on the server.