First published: Fri Dec 05 2008(Updated: )
Integer overflow in the JAR unpacking utility (unpack200) in the unpack library (unpack.dll) in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows untrusted applications and applets to gain privileges via a Pack200 compressed JAR file that triggers a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun JDK | =5.0-update_12 | |
Sun JRE | =6 | |
Sun JDK | =5.0-update_15 | |
Sun JDK | <=5.0 | |
Sun JDK | =5.0-update_3 | |
Sun JRE | =5.0-update_13 | |
Sun JRE | =5.0-update_1 | |
Sun JDK | =5.0-update_11 | |
Sun JDK | =6-update_6 | |
Sun JDK | =6-update_7 | |
Sun JRE | =5.0-update_14 | |
Sun JRE | =6-update_3 | |
Sun JRE | =6-update_4 | |
Sun JRE | =5.0-update_12 | |
Sun JDK | =5.0-update_1 | |
Sun JDK | =6-update_1 | |
Sun JDK | =6 | |
Sun JDK | =6-update_3 | |
Sun JRE | =6-update_2 | |
Sun JDK | =6-update_4 | |
Sun JRE | <=6 | |
Sun JDK | <=6 | |
Sun JRE | =5.0-update_15 | |
Sun JRE | =6-update_5 | |
Sun JDK | =5.0-update_14 | |
Sun JDK | =6-update_8 | |
Sun JRE | =5.0-update_2 | |
Sun JRE | <=5.0 | |
Sun JDK | =6-update_2 | |
Sun JRE | =6-update_7 | |
Sun JRE | =6-update_8 | |
Sun JDK | =5.0-update_13 | |
Sun JRE | =5.0-update_11 | |
Sun JRE | =6-update_1 | |
Sun JDK | =6-update_5 | |
Sun JDK | =5.0-update_10 | |
Sun JDK | =5.0-update_2 | |
Sun JRE | =5.0 | |
Sun JRE | =6-update_6 | |
Sun JRE | =5.0-update_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5352 has been classified with a high severity due to its potential to allow untrusted applications to gain elevated privileges.
To fix CVE-2008-5352, upgrade to a patched version of the Java Runtime Environment that is later than Update 10 for JRE 6 or Update 16 for JDK 5.0.
CVE-2008-5352 affects Java Runtime Environment (JRE) 6 Update 10 and earlier, and JDK 5.0 Update 16 and earlier.
CVE-2008-5352 can be exploited by attackers to execute arbitrary code with the privileges of the user running the Java application.
Untrusted applications can exploit CVE-2008-5352 through the unpack200 utility, allowing them to gain unauthorized privileges.