First published: Wed Jul 09 2008(Updated: )
Unspecified vulnerability in scripting language support in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun JRE | =6-update_3 | |
Sun JRE | =6-update_4 | |
Sun JDK | =6-update_1 | |
Sun JDK | =6-update_3 | |
Sun JRE | =6-update_2 | |
Sun JDK | =6-update_4 | |
Sun JRE | <=6 | |
Sun JRE | =6-update_5 | |
Sun JDK | <=6 | |
Sun JDK | =6-update_2 | |
Sun JRE | =6-update_1 | |
Sun JDK | =6-update_5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3109 has a high severity rating due to its ability to allow context-dependent attackers to gain privileges.
To mitigate CVE-2008-3109, users should upgrade to a patched version of the Sun Java Runtime Environment or Sun JDK that is not affected by this vulnerability.
CVE-2008-3109 affects Sun JRE and JDK version 6 Update 6 and earlier, including specific updates like 1, 2, 3, 4, and 5.
Yes, CVE-2008-3109 can potentially be exploited by attackers remotely through untrusted applications or applets.
While CVE-2008-3109 is an older vulnerability, it is still relevant for systems that have not been updated and continue to use affected software.