First published: Fri Dec 05 2008(Updated: )
The "Java Update" feature for Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not verify the signature of the JRE that is downloaded, which allows remote attackers to execute arbitrary code via DNS man-in-the-middle attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Java Development Kit (JDK) | <=5.0 | |
Java Development Kit (JDK) | <=6 | |
Java Development Kit (JDK) | =5.0-update_1 | |
Java Development Kit (JDK) | =5.0-update_10 | |
Java Development Kit (JDK) | =5.0-update_11 | |
Java Development Kit (JDK) | =5.0-update_12 | |
Java Development Kit (JDK) | =5.0-update_13 | |
Java Development Kit (JDK) | =5.0-update_14 | |
Java Development Kit (JDK) | =5.0-update_15 | |
Java Development Kit (JDK) | =5.0-update_2 | |
Java Development Kit (JDK) | =5.0-update_3 | |
Java Development Kit (JDK) | =5.0-update_4 | |
Java Development Kit (JDK) | =5.0-update_5 | |
Java Development Kit (JDK) | =5.0-update_6 | |
Java Development Kit (JDK) | =5.0-update_7 | |
Java Development Kit (JDK) | =5.0-update_8 | |
Java Development Kit (JDK) | =5.0-update_9 | |
Java Development Kit (JDK) | =6 | |
Java Development Kit (JDK) | =6-update_1 | |
Java Development Kit (JDK) | =6-update_2 | |
Java Development Kit (JDK) | =6-update_3 | |
Java Development Kit (JDK) | =6-update_4 | |
Java Development Kit (JDK) | =6-update_5 | |
Java Development Kit (JDK) | =6-update_6 | |
Java Development Kit (JDK) | =6-update_7 | |
Java Development Kit (JDK) | =6-update_8 | |
Java Development Kit (JDK) | =6-update_9 | |
Sun Java Runtime Environment (JRE) | <=1.4.2_18 | |
Sun Java Runtime Environment (JRE) | <=5.0 | |
Sun Java Runtime Environment (JRE) | <=6 | |
Sun Java Runtime Environment (JRE) | =1.4.2_1 | |
Sun Java Runtime Environment (JRE) | =1.4.2_2 | |
Sun Java Runtime Environment (JRE) | =1.4.2_3 | |
Sun Java Runtime Environment (JRE) | =1.4.2_4 | |
Sun Java Runtime Environment (JRE) | =1.4.2_5 | |
Sun Java Runtime Environment (JRE) | =1.4.2_6 | |
Sun Java Runtime Environment (JRE) | =1.4.2_7 | |
Sun Java Runtime Environment (JRE) | =1.4.2_8 | |
Sun Java Runtime Environment (JRE) | =1.4.2_9 | |
Sun Java Runtime Environment (JRE) | =1.4.2_10 | |
Sun Java Runtime Environment (JRE) | =1.4.2_11 | |
Sun Java Runtime Environment (JRE) | =1.4.2_12 | |
Sun Java Runtime Environment (JRE) | =1.4.2_13 | |
Sun Java Runtime Environment (JRE) | =1.4.2_14 | |
Sun Java Runtime Environment (JRE) | =1.4.2_15 | |
Sun Java Runtime Environment (JRE) | =1.4.2_16 | |
Sun Java Runtime Environment (JRE) | =1.4.2_17 | |
Sun Java Runtime Environment (JRE) | =5.0 | |
Sun Java Runtime Environment (JRE) | =5.0-update_1 | |
Sun Java Runtime Environment (JRE) | =5.0-update_10 | |
Sun Java Runtime Environment (JRE) | =5.0-update_11 | |
Sun Java Runtime Environment (JRE) | =5.0-update_12 | |
Sun Java Runtime Environment (JRE) | =5.0-update_13 | |
Sun Java Runtime Environment (JRE) | =5.0-update_14 | |
Sun Java Runtime Environment (JRE) | =5.0-update_15 | |
Sun Java Runtime Environment (JRE) | =5.0-update_2 | |
Sun Java Runtime Environment (JRE) | =5.0-update_3 | |
Sun Java Runtime Environment (JRE) | =5.0-update_4 | |
Sun Java Runtime Environment (JRE) | =5.0-update_5 | |
Sun Java Runtime Environment (JRE) | =5.0-update_6 | |
Sun Java Runtime Environment (JRE) | =5.0-update_7 | |
Sun Java Runtime Environment (JRE) | =5.0-update_8 | |
Sun Java Runtime Environment (JRE) | =5.0-update_9 | |
Sun Java Runtime Environment (JRE) | =6 | |
Sun Java Runtime Environment (JRE) | =6-update_1 | |
Sun Java Runtime Environment (JRE) | =6-update_2 | |
Sun Java Runtime Environment (JRE) | =6-update_3 | |
Sun Java Runtime Environment (JRE) | =6-update_4 | |
Sun Java Runtime Environment (JRE) | =6-update_5 | |
Sun Java Runtime Environment (JRE) | =6-update_6 | |
Sun Java Runtime Environment (JRE) | =6-update_7 | |
Sun Java Runtime Environment (JRE) | =6-update_8 | |
Sun Java Runtime Environment (JRE) | =6-update_9 | |
Java Development Kit (JDK) | <=1.4.2_18 | |
Java Development Kit (JDK) | =1.4.2_1 | |
Java Development Kit (JDK) | =1.4.2_2 | |
Java Development Kit (JDK) | =1.4.2_3 | |
Java Development Kit (JDK) | =1.4.2_4 | |
Java Development Kit (JDK) | =1.4.2_5 | |
Java Development Kit (JDK) | =1.4.2_6 | |
Java Development Kit (JDK) | =1.4.2_7 | |
Java Development Kit (JDK) | =1.4.2_8 | |
Java Development Kit (JDK) | =1.4.2_9 | |
Java Development Kit (JDK) | =1.4.2_10 | |
Java Development Kit (JDK) | =1.4.2_11 | |
Java Development Kit (JDK) | =1.4.2_12 | |
Java Development Kit (JDK) | =1.4.2_13 | |
Java Development Kit (JDK) | =1.4.2_14 | |
Java Development Kit (JDK) | =1.4.2_15 | |
Java Development Kit (JDK) | =1.4.2_16 | |
Java Development Kit (JDK) | =1.4.2_17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5355 is rated as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2008-5355, you should update your Java Runtime Environment to a version that is newer than JRE 6 Update 10.
CVE-2008-5355 affects Sun JDK and JRE 6 Update 10 and earlier, JDK and JRE 5.0 Update 16 and earlier, and SDK and JRE 1.4.2_18 and earlier.
CVE-2008-5355 can be exploited to allow remote attackers to execute arbitrary code on a vulnerable system.
Yes, CVE-2008-5355 is related to the 'Java Update' feature in the Java Runtime Environment that does not verify the signature of the downloaded JRE.