Buffer overflow in Sun Java Runtime Environment (JRE) in JDK and JRE 5.0 before Update 10, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allows context-dependent attackers to gain privileges via unspecified vectors related to font processing.
References
Link Resource
http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=122331139823057&w=2 Mailing List Third Party Advisory
http://secunia.com/advisories/31010 Third Party Advisory
http://secunia.com/advisories/31320 Third Party Advisory
http://secunia.com/advisories/31497 Third Party Advisory
http://secunia.com/advisories/31600 Third Party Advisory
http://secunia.com/advisories/31736 Third Party Advisory
http://secunia.com/advisories/32018 Third Party Advisory
http://secunia.com/advisories/32179 Third Party Advisory
http://secunia.com/advisories/32180 Third Party Advisory
http://secunia.com/advisories/33236 Third Party Advisory
http://secunia.com/advisories/33237 Third Party Advisory
http://secunia.com/advisories/37386 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200911-02.xml Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238666-1 Broken Link
http://support.apple.com/kb/HT3178 Third Party Advisory
http://support.apple.com/kb/HT3179 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-300.htm Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm Third Party Advisory
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014 Third Party Advisory
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0790.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-1043.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-1044.html Third Party Advisory
http://www.securityfocus.com/archive/1/497041/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/30147 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020461 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-193A.html Third Party Advisory US Government Resource
http://www.vmware.com/security/advisories/VMSA-2008-0016.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/2056/references Third Party Advisory
http://www.vupen.com/english/advisories/2008/2740 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/43656 VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2008-07-09T23:00:00

Updated: 2018-10-11T19:57:01

Reserved: 2008-07-09T00:00:00


Link: CVE-2008-3108

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2008-07-09T23:41:00.000

Modified: 2019-07-31T12:47:06.483


Link: CVE-2008-3108

JSON object: View

cve-icon Redhat Information

No data.

CWE