CVE-2008-3440
Published Aug 1, 2008
Last updated 16 years ago
Overview
- Description
- Sun Java 1.6.0_03 and earlier versions, and possibly later versions, does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Vendor comments
- Red HatNot vulnerable. This issue did not affect the versions of Sun Java packages as shipped with Red Hat Enterprise Linux 4 Extras, or 5 Supplementary. The updated Red Hat Enterprise Linux packages are not distributed via the java.sun.com update service (which is only used for Windows version of Sun Java), but rather via Red Hat Network, using the package manager capabilities to verify authenticity of updates.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java:*:03:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E058007-3515-4DCA-8B75-9EF968A0047D", "versionEndIncluding": "1.6.0" }, { "criteria": "cpe:2.3:a:sun:java:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7CE9F51-E622-45B1-A4A6-28445BD39901" }, { "criteria": "cpe:2.3:a:sun:java:1.6.0:01:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCE41A38-36BA-4435-A84E-70CBCAC8CEDE" }, { "criteria": "cpe:2.3:a:sun:java:1.6.0:02:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB872AA1-B0D1-45F3-B52C-75E41A6827EB" } ], "operator": "OR" } ] } ]