{ "id": "CVE-2005-3907", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-30T11:03:00.000", "lastModified": "2024-11-21T00:03:01.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Java Runtime Environment in Java JDK and JRE 5.0 Update 3 and earlier allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors involving untrusted Java applets." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jdk:1.5.0_03:*:linux:*:*:*:*:*", "matchCriteriaId": "04750697-851D-40E6-B13A-1257FD7CB0A4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jdk:1.5.0_03:*:solaris:*:*:*:*:*", "matchCriteriaId": "0DF9EC3A-E40C-415B-8BF3-40D3C474AF70" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jdk:1.5.0_03:*:windows:*:*:*:*:*", "matchCriteriaId": "937EEE89-443C-4435-9064-EE228B3CEBD9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AAB87D43-2860-43DD-94EE-886D7D75A351" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*", "matchCriteriaId": "7F30BCF2-E6A3-49E9-98BC-7948244C8FF7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*", "matchCriteriaId": "8966374E-426B-42A7-9D62-9A9A14032390" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*", "matchCriteriaId": "634F8387-DFBE-4B78-9063-65737160F13A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*", "matchCriteriaId": "923FA413-0F4E-4373-83F9-80DC9CA57D15" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*", "matchCriteriaId": "A06743B3-2637-47C2-BD1A-28D9F584ED75" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "399B06AC-E101-48EE-A362-D75F7072FF5E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*", "matchCriteriaId": "F7F1CF2B-F0B6-45DD-88E1-C0BDF2B973BB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.1:update15:*:*:*:*:*:*", "matchCriteriaId": "BF5081A4-C1D4-4312-BF0B-DEB47836953B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*", "matchCriteriaId": "04FB9247-7DB5-46A1-9E99-C25A729FB5D7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.1:update4:*:*:*:*:*:*", "matchCriteriaId": "218831F9-2C00-4E66-B3B8-B9537C89863F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.3.1:update8:*:*:*:*:*:*", "matchCriteriaId": "50C269C1-8B4F-4622-A937-DABE766C2CEA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "355CB56A-A598-4CD6-9AFB-FE0B09FFC2C9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "63978872-E797-4F13-B0F9-98CB67D0962A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133A7B66-E0B3-4867-A5A4-3C54D6C0C8ED" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "matchCriteriaId": "A7FC09E8-7F30-4FE4-912E-588AA250E2A3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "matchCriteriaId": "7EA5B9E9-654D-44F7-AE98-3D8B382804AC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "matchCriteriaId": "44051CFE-D15D-4416-A123-F3E49C67A9E7" } ] } ] } ], "references": [ { "url": "http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/17748", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/17847", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/18092", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1015282", "source": "cve@mitre.org" }, { "url": "http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102050-1", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.kb.cert.org/vuls/id/355284", "source": "cve@mitre.org", "tags": [ "US Government Resource" ] }, { "url": "http://www.securityfocus.com/bid/15615", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2005/2636", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2005/2675", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23250", "source": "cve@mitre.org" }, { "url": "http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/17748", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/17847", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/18092", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1015282", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102050-1", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.kb.cert.org/vuls/id/355284", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ] }, { "url": "http://www.securityfocus.com/bid/15615", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2005/2636", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2005/2675", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23250", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }