CWE
189 119 190
Advisory Published
Updated

CVE-2008-5357: Buffer Overflow

First published: Fri Dec 05 2008(Updated: )

Integer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file, which triggers a heap-based buffer overflow.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Sun JRE=1.6.0-update_3
Sun JRE=1.4.2_7
Sun JRE=1.6.0-update_5
Sun JRE=1.4.2_16
Sun JRE=1.3.1
Sun JRE=1.3.1_10
Sun JRE=1.3.1_06
Sun JRE=1.4.2_4
Sun JRE=1.4.2_2
Sun JRE=1.3.1_20
Sun JRE=1.3.1_22
Sun JRE=1.5.0-update2
Sun JRE=1.3.1_2
Sun JRE=1.6.0-update_1
Sun JRE=1.4.2_15
Sun JRE=1.5.0-update13
Sun JRE=1.6.0-update_2
Sun JRE=1.4.2_13
Sun JRE=1.4.2_1
Sun JRE=1.4.2_8
Sun JRE=1.5.0-update12
Sun JRE=1.3.1_16
Sun JRE=1.3.1_19
Sun JRE=1.6.0-update_6
Sun JRE=1.3.1_11
Sun JRE=1.3.1_17
Sun JRE=1.5.0-update16
Sun JRE=1.4.2_12
Sun JRE=1.3.1_12
Sun JRE=1.3.1_03
Sun JRE=1.3.1_14
Sun JRE=1.5.0-update11
Sun JRE=1.5.0-update15
Sun JRE=1.3.1_08
Sun JRE=1.6.0-update_10
Sun JRE=1.4.2_18
Sun JRE=1.4.2_14
Sun JRE=1.3.1_07
Sun JRE=1.3.1_05
Sun JRE=1.4.2_10
Sun JRE=1.4.2_17
Sun JRE=1.5.0-update14
Sun JRE=1.4.2_9
Sun JRE=1.4.2
Sun JRE=1.3.1_13
Sun JRE=1.3.1_04
Sun JRE=1.3.1_09
Sun JRE=1.4.2_11
Sun JRE=1.5.0-update1
Sun JRE=1.3.1_18
Sun JRE=1.3.1_23
Sun JRE=1.5.0-update10
Sun JRE=1.3.1_15
Sun JRE=1.6.0-update_4
Sun JRE=1.4.2_3
Sun JRE=1.4.2_5
Sun JRE=1.3.1_21
Sun JRE=1.4.2_6
Sun JRE=1.5.0
Sun JRE=1.6.0
OpenJDK=1.6.0-update_4
OpenJDK=1.6.0-update_7
OpenJDK=1.5.0-update3
OpenJDK=1.6.0-update_3
OpenJDK=1.6.0-update_10
OpenJDK=1.5.0-update9
OpenJDK=1.6.0-update_5
OpenJDK=1.5.0-update6
OpenJDK=1.5.0-update1
OpenJDK=1.5.0-update4
OpenJDK=1.5.0-update7
OpenJDK=1.5.0-update5
OpenJDK=1.5.0-update7_b03
OpenJDK=1.5.0-update2
OpenJDK=1.5.0-update8
OpenJDK=1.6.0-update_6
OpenJDK=1.5.0-update10
OpenJDK=1.5.0
OpenJDK=1.6.0
Sun SDK=1.3.1_03
Sun SDK=1.3.1_23
Sun SDK=1.4.2
Sun SDK=1.3.1_19
Sun SDK=1.3.1
Sun SDK=1.3.1_08
Sun SDK=1.4.2_10
Sun SDK=1.4.2_12
Sun SDK=1.3.1_15
Sun SDK=1.4.2_17
Sun SDK=1.4.2_14
Sun SDK=1.4.2_04
Sun SDK=1.4.2_13
Sun SDK=1.4.2_6
Sun SDK=1.3.1_07
Sun SDK=1.4.2_2
Sun SDK=1.3.1_10
Sun SDK=1.4.2_5
Sun SDK=1.3.1_06
Sun SDK=1.4.2_1
Sun SDK=1.4.2_18
Sun SDK=1.3.1_12
Sun SDK=1.4.2_4
Sun SDK=1.3.1_20
Sun SDK=1.3.1_17
Sun SDK=1.3.1_02
Sun SDK=1.3.1_18
Sun SDK=1.3.1_01
Sun SDK=1.3.1_16
Sun SDK=1.3.1_01a
Sun SDK=1.3.1_22
Sun SDK=1.3.1_14
Sun SDK=1.4.2_7
Sun SDK=1.3.1_13
Sun SDK=1.4.2_09
Sun SDK=1.4.2_8
Sun SDK=1.4.2_02
Sun SDK=1.4.2_16
Sun SDK=1.4.2_11
Sun SDK=1.3.1_09
Sun SDK=1.4.2_9
Sun SDK=1.3.1_04
Sun SDK=1.3.1_21
Sun SDK=1.4.2_08
Sun SDK=1.3.1_05
Sun SDK=1.4.2_03
Sun SDK=1.4.2_3
Sun SDK=1.3.1_11
Sun SDK=1.4.2_15

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2008-5357?

    The severity of CVE-2008-5357 is considered high due to its potential for remote code execution.

  • How can I mitigate CVE-2008-5357?

    Mitigation for CVE-2008-5357 includes updating to the latest version of the Java Runtime Environment (JRE) or applying patches provided by the vendor.

  • What versions are affected by CVE-2008-5357?

    CVE-2008-5357 affects Sun JDK and JRE versions prior to update 11 of 6, update 16 of 5.0, and various earlier versions of 1.4.2 and 1.3.1.

  • What type of attack does CVE-2008-5357 allow?

    CVE-2008-5357 allows remote attackers to execute arbitrary code by exploiting an integer overflow associated with a crafted TrueType font file.

  • Is a workaround available for CVE-2008-5357?

    No official workarounds for CVE-2008-5357 are documented; the recommended solution is to update or patch the affected environment.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203