CWE
119
Advisory Published
Updated

CVE-2008-5359: Buffer Overflow

First published: Fri Dec 05 2008(Updated: )

Buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code, related to a ConvolveOp operation in the Java AWT library.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Sun JRE=1.6.0-update_3
Sun JRE=1.4.2_7
Sun JRE=1.6.0-update_5
Sun JRE=1.4.2_16
Sun JRE=1.3.1
Sun JRE=1.3.1_10
Sun JRE=1.3.1_06
Sun JRE=1.5.0
Sun JRE=1.4.2_4
Sun JRE=1.4.2_2
Sun JRE=1.3.1_20
Sun JRE=1.3.1_22
Sun JRE=1.5.0-update2
Sun JRE=1.3.1_2
Sun JRE=1.6.0-update_1
Sun JRE=1.4.2_15
Sun JRE=1.5.0-update13
Sun JRE=1.6.0-update_2
Sun JRE=1.4.2_13
Sun JRE=1.4.2_1
Sun JRE=1.4.2_8
Sun JRE=1.5.0-update12
Sun JRE=1.3.1_16
Sun JRE=1.3.1_19
Sun JRE=1.6.0-update_6
Sun JRE=1.3.1_11
Sun JRE=1.3.1_17
Sun JRE=1.5.0-update16
Sun JRE=1.4.2_12
Sun JRE=1.3.1_12
Sun JRE=1.3.1_03
Sun JRE=1.3.1_14
Sun JRE=1.5.0-update11
Sun JRE=1.6.0
Sun JRE=1.5.0-update15
Sun JRE=1.3.1_08
Sun JRE=1.6.0-update_10
Sun JRE=1.4.2_18
Sun JRE=1.4.2_14
Sun JRE=1.3.1_07
Sun JRE=1.3.1_05
Sun JRE=1.4.2_10
Sun JRE=1.4.2_17
Sun JRE=1.5.0-update14
Sun JRE=1.4.2_9
Sun JRE=1.4.2
Sun JRE=1.3.1_13
Sun JRE=1.3.1_04
Sun JRE=1.3.1_09
Sun JRE=1.4.2_11
Sun JRE=1.5.0-update1
Sun JRE=1.3.1_18
Sun JRE=1.3.1_23
Sun JRE=1.5.0-update10
Sun JRE=1.3.1_15
Sun JRE=1.6.0-update_4
Sun JRE=1.4.2_3
Sun JRE=1.4.2_5
Sun JRE=1.3.1_21
Sun JRE=1.4.2_6
OpenJDK=1.6.0-update_4
OpenJDK=1.6.0-update_7
OpenJDK=1.5.0-update3
OpenJDK=1.6.0-update_3
OpenJDK=1.6.0-update_10
OpenJDK=1.5.0-update9
OpenJDK=1.6.0
OpenJDK=1.6.0-update_5
OpenJDK=1.5.0-update6
OpenJDK=1.5.0-update1
OpenJDK=1.5.0-update4
OpenJDK=1.5.0-update7
OpenJDK=1.5.0
OpenJDK=1.5.0-update5
OpenJDK=1.5.0-update7_b03
OpenJDK=1.5.0-update2
OpenJDK=1.5.0-update8
OpenJDK=1.6.0-update_6
OpenJDK=1.5.0-update10
Sun SDK=1.3.1_03
Sun SDK=1.3.1_23
Sun SDK=1.4.2
Sun SDK=1.3.1_19
Sun SDK=1.3.1
Sun SDK=1.3.1_08
Sun SDK=1.4.2_10
Sun SDK=1.4.2_12
Sun SDK=1.3.1_15
Sun SDK=1.4.2_17
Sun SDK=1.4.2_14
Sun SDK=1.4.2_04
Sun SDK=1.4.2_13
Sun SDK=1.4.2_6
Sun SDK=1.3.1_07
Sun SDK=1.4.2_2
Sun SDK=1.3.1_10
Sun SDK=1.4.2_5
Sun SDK=1.3.1_06
Sun SDK=1.4.2_1
Sun SDK=1.4.2_18
Sun SDK=1.3.1_12
Sun SDK=1.4.2_4
Sun SDK=1.3.1_20
Sun SDK=1.3.1_17
Sun SDK=1.3.1_02
Sun SDK=1.3.1_18
Sun SDK=1.3.1_01
Sun SDK=1.3.1_16
Sun SDK=1.3.1_01a
Sun SDK=1.3.1_22
Sun SDK=1.3.1_14
Sun SDK=1.4.2_7
Sun SDK=1.3.1_13
Sun SDK=1.4.2_09
Sun SDK=1.4.2_8
Sun SDK=1.4.2_02
Sun SDK=1.4.2_16
Sun SDK=1.4.2_11
Sun SDK=1.3.1_09
Sun SDK=1.4.2_9
Sun SDK=1.3.1_04
Sun SDK=1.3.1_21
Sun SDK=1.4.2_08
Sun SDK=1.3.1_05
Sun SDK=1.4.2_03
Sun SDK=1.4.2_3
Sun SDK=1.3.1_11
Sun SDK=1.4.2_15

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2008-5359?

    CVE-2008-5359 has a high severity rating due to its potential to allow remote attackers to execute arbitrary code through a buffer overflow.

  • How do I fix CVE-2008-5359?

    To fix CVE-2008-5359, upgrade to a later version of the Java Runtime Environment that is not affected by this vulnerability.

  • Which software is affected by CVE-2008-5359?

    CVE-2008-5359 affects several versions of Sun JDK and JRE, including 6 Update 10 and earlier, 5.0 Update 16 and earlier, and 1.4.2_18 and earlier.

  • Can CVE-2008-5359 be exploited remotely?

    Yes, CVE-2008-5359 can be exploited remotely by attackers, particularly through maliciously crafted images or data processed by the Java Runtime Environment.

  • Is there a known fix or patch for CVE-2008-5359?

    Yes, Sun Microsystems has released patches for affected JDK and JRE versions to address CVE-2008-5359.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203