René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

110 lines
3.8 KiB
JSON

{
"id": "CVE-2008-3440",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-08-01T14:41:00.000",
"lastModified": "2008-09-10T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Sun Java 1.6.0_03 and earlier versions, and possibly later versions, does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning."
},
{
"lang": "es",
"value": "Sun Java versi\u00f3n 1.6.0_03 y anteriores, y posiblemente versiones posteriores, no comprueba apropiadamente la autenticidad de las actualizaciones, lo que permite a los atacantes de tipo man-in-the-middle ejecutar c\u00f3digo arbitrario por medio de una actualizaci\u00f3n de tipo caballo de Troya, como es demostrado por evilgrade y Envenenamiento de cach\u00e9 DNS."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "Not vulnerable. This issue did not affect the versions of Sun Java packages as shipped with Red Hat Enterprise Linux 4 Extras, or 5 Supplementary. The updated Red Hat Enterprise Linux packages are not distributed via the java.sun.com update service (which is only used for Windows version of Sun Java), but rather via Red Hat Network, using the package manager capabilities to verify authenticity of updates.",
"lastModified": "2008-08-06T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java:*:03:*:*:*:*:*:*",
"versionEndIncluding": "1.6.0",
"matchCriteriaId": "5E058007-3515-4DCA-8B75-9EF968A0047D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CE9F51-E622-45B1-A4A6-28445BD39901"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java:1.6.0:01:*:*:*:*:*:*",
"matchCriteriaId": "BCE41A38-36BA-4435-A84E-70CBCAC8CEDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java:1.6.0:02:*:*:*:*:*:*",
"matchCriteriaId": "EB872AA1-B0D1-45F3-B52C-75E41A6827EB"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1020584",
"source": "cve@mitre.org"
},
{
"url": "http://www.infobyte.com.ar/down/Francisco%20Amato%20-%20evilgrade%20-%20ENG.pdf",
"source": "cve@mitre.org"
}
]
}