Unrated severityNVD Advisory· Published Mar 6, 2008· Updated Apr 23, 2026
CVE-2008-1188
CVE-2008-1188
Description
Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allow remote attackers to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka "The first two issues."
Affected products
38cpe:2.3:a:sun:jdk:1.5.0:-:*:*:*:*:*:*+ 17 more
- cpe:2.3:a:sun:jdk:1.5.0:-:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*+ 19 more
- cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
32- sunsolve.sun.com/search/document.donvdPatchThird Party Advisory
- lists.apple.com/archives/security-announce//2008/Sep/msg00008.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.htmlnvdMailing ListThird Party Advisory
- secunia.com/advisories/29239nvdThird Party Advisory
- secunia.com/advisories/29273nvdThird Party Advisory
- secunia.com/advisories/29498nvdThird Party Advisory
- secunia.com/advisories/29582nvdThird Party Advisory
- secunia.com/advisories/29858nvdThird Party Advisory
- secunia.com/advisories/29897nvdThird Party Advisory
- secunia.com/advisories/30676nvdThird Party Advisory
- secunia.com/advisories/30780nvdThird Party Advisory
- secunia.com/advisories/31497nvdThird Party Advisory
- secunia.com/advisories/32018nvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200804-28.xmlnvdThird Party Advisory
- support.apple.com/kb/HT3178nvdThird Party Advisory
- support.apple.com/kb/HT3179nvdThird Party Advisory
- www.gentoo.org/security/en/glsa/glsa-200804-20.xmlnvdThird Party Advisory
- www.gentoo.org/security/en/glsa/glsa-200806-11.xmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2008-0186.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2008-0210.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2008-0267.htmlnvdThird Party Advisory
- www.securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.us-cert.gov/cas/techalerts/TA08-066A.htmlnvdThird Party AdvisoryUS Government Resource
- www.vmware.com/security/advisories/VMSA-2008-0010.htmlnvdThird Party Advisory
- www.vupen.com/english/advisories/2008/0770/referencesnvdThird Party Advisory
- www.vupen.com/english/advisories/2008/1856/referencesnvdThird Party Advisory
- www.zerodayinitiative.com/advisories/ZDI-08-009/nvdThird Party AdvisoryVDB Entry
- www.zerodayinitiative.com/advisories/ZDI-08-010/nvdThird Party AdvisoryVDB Entry
- exchange.xforce.ibmcloud.com/vulnerabilities/41029nvdThird Party AdvisoryVDB Entry
- exchange.xforce.ibmcloud.com/vulnerabilities/41133nvdThird Party AdvisoryVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11209nvdThird Party Advisory
News mentions
0No linked articles in our index yet.