cpe:/a:sun:jdk:1.5.0 cpe:/a:sun:jdk:1.5.0:update1 cpe:/a:sun:jdk:1.5.0:update10 cpe:/a:sun:jdk:1.5.0:update2 cpe:/a:sun:jdk:1.5.0:update3 cpe:/a:sun:jdk:1.5.0:update4 cpe:/a:sun:jdk:1.5.0:update5 cpe:/a:sun:jdk:1.5.0:update6 cpe:/a:sun:jdk:1.5.0:update7 cpe:/a:sun:jdk:1.5.0:update7_b03 cpe:/a:sun:jdk:1.5.0:update8 cpe:/a:sun:jdk:1.5.0:update9 cpe:/a:sun:jdk:1.6.0 cpe:/a:sun:jdk:1.6.0:update_10 cpe:/a:sun:jdk:1.6.0:update_3 cpe:/a:sun:jdk:1.6.0:update_4 cpe:/a:sun:jdk:1.6.0:update_5 cpe:/a:sun:jdk:1.6.0:update_6 cpe:/a:sun:jdk:1.6.0:update_7 cpe:/a:sun:jre:1.3.1 cpe:/a:sun:jre:1.3.1_2 cpe:/a:sun:jre:1.3.1_03 cpe:/a:sun:jre:1.3.1_04 cpe:/a:sun:jre:1.3.1_05 cpe:/a:sun:jre:1.3.1_06 cpe:/a:sun:jre:1.3.1_07 cpe:/a:sun:jre:1.3.1_08 cpe:/a:sun:jre:1.3.1_09 cpe:/a:sun:jre:1.3.1_10 cpe:/a:sun:jre:1.3.1_11 cpe:/a:sun:jre:1.3.1_12 cpe:/a:sun:jre:1.3.1_13 cpe:/a:sun:jre:1.3.1_14 cpe:/a:sun:jre:1.3.1_15 cpe:/a:sun:jre:1.3.1_16 cpe:/a:sun:jre:1.3.1_17 cpe:/a:sun:jre:1.3.1_18 cpe:/a:sun:jre:1.3.1_19 cpe:/a:sun:jre:1.3.1_20 cpe:/a:sun:jre:1.3.1_21 cpe:/a:sun:jre:1.3.1_22 cpe:/a:sun:jre:1.3.1_23 cpe:/a:sun:jre:1.4.2 cpe:/a:sun:jre:1.4.2_1 cpe:/a:sun:jre:1.4.2_2 cpe:/a:sun:jre:1.4.2_3 cpe:/a:sun:jre:1.4.2_4 cpe:/a:sun:jre:1.4.2_5 cpe:/a:sun:jre:1.4.2_6 cpe:/a:sun:jre:1.4.2_7 cpe:/a:sun:jre:1.4.2_8 cpe:/a:sun:jre:1.4.2_9 cpe:/a:sun:jre:1.4.2_10 cpe:/a:sun:jre:1.4.2_11 cpe:/a:sun:jre:1.4.2_12 cpe:/a:sun:jre:1.4.2_13 cpe:/a:sun:jre:1.4.2_14 cpe:/a:sun:jre:1.4.2_15 cpe:/a:sun:jre:1.4.2_16 cpe:/a:sun:jre:1.4.2_17 cpe:/a:sun:jre:1.4.2_18 cpe:/a:sun:jre:1.5.0 cpe:/a:sun:jre:1.5.0:update1 cpe:/a:sun:jre:1.5.0:update10 cpe:/a:sun:jre:1.5.0:update11 cpe:/a:sun:jre:1.5.0:update12 cpe:/a:sun:jre:1.5.0:update13 cpe:/a:sun:jre:1.5.0:update14 cpe:/a:sun:jre:1.5.0:update15 cpe:/a:sun:jre:1.5.0:update16 cpe:/a:sun:jre:1.5.0:update2 cpe:/a:sun:jre:1.6.0 cpe:/a:sun:jre:1.6.0:update_1 cpe:/a:sun:jre:1.6.0:update_10 cpe:/a:sun:jre:1.6.0:update_2 cpe:/a:sun:jre:1.6.0:update_3 cpe:/a:sun:jre:1.6.0:update_4 cpe:/a:sun:jre:1.6.0:update_5 cpe:/a:sun:jre:1.6.0:update_6 cpe:/a:sun:sdk:1.3.1 cpe:/a:sun:sdk:1.3.1_01 cpe:/a:sun:sdk:1.3.1_01a cpe:/a:sun:sdk:1.3.1_02 cpe:/a:sun:sdk:1.3.1_03 cpe:/a:sun:sdk:1.3.1_04 cpe:/a:sun:sdk:1.3.1_05 cpe:/a:sun:sdk:1.3.1_06 cpe:/a:sun:sdk:1.3.1_07 cpe:/a:sun:sdk:1.3.1_08 cpe:/a:sun:sdk:1.3.1_09 cpe:/a:sun:sdk:1.3.1_10 cpe:/a:sun:sdk:1.3.1_11 cpe:/a:sun:sdk:1.3.1_12 cpe:/a:sun:sdk:1.3.1_13 cpe:/a:sun:sdk:1.3.1_14 cpe:/a:sun:sdk:1.3.1_15 cpe:/a:sun:sdk:1.3.1_16 cpe:/a:sun:sdk:1.3.1_17 cpe:/a:sun:sdk:1.3.1_18 cpe:/a:sun:sdk:1.3.1_19 cpe:/a:sun:sdk:1.3.1_20 cpe:/a:sun:sdk:1.3.1_21 cpe:/a:sun:sdk:1.3.1_22 cpe:/a:sun:sdk:1.3.1_23 cpe:/a:sun:sdk:1.4.2 cpe:/a:sun:sdk:1.4.2_1 cpe:/a:sun:sdk:1.4.2_2 cpe:/a:sun:sdk:1.4.2_03 cpe:/a:sun:sdk:1.4.2_4 cpe:/a:sun:sdk:1.4.2_5 cpe:/a:sun:sdk:1.4.2_6 cpe:/a:sun:sdk:1.4.2_7 cpe:/a:sun:sdk:1.4.2_8 cpe:/a:sun:sdk:1.4.2_09 cpe:/a:sun:sdk:1.4.2_10 cpe:/a:sun:sdk:1.4.2_11 cpe:/a:sun:sdk:1.4.2_12 cpe:/a:sun:sdk:1.4.2_13 cpe:/a:sun:sdk:1.4.2_14 cpe:/a:sun:sdk:1.4.2_15 cpe:/a:sun:sdk:1.4.2_16 cpe:/a:sun:sdk:1.4.2_17 cpe:/a:sun:sdk:1.4.2_18 CVE-2008-5359 2008-12-05T06:30:00.643-05:00 2019-10-09T18:56:59.037-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov SUNALERT 244987 BID 32608 SECUNIA 32991 SECUNIA 33015 SECUNIA 33187 SECUNIA 33528 SECUNIA 33709 SECUNIA 33710 SECUNIA 34233 SECUNIA 34259 SECUNIA 34605 SECUNIA 34889 SECUNIA 34972 SECUNIA 35065 SECUNIA 37386 SECUNIA 38539 VUPEN ADV-2008-3339 VUPEN ADV-2009-0672 GENTOO GLSA-200911-02 HP HPSBUX02411 IAVM IAVM:2009-A-0105 REDHAT RHSA-2008:1018 REDHAT RHSA-2008:1025 REDHAT RHSA-2009:0015 REDHAT RHSA-2009:0016 REDHAT RHSA-2009:0445 REDHAT RHSA-2009:0466 HP SSRT080111 HP SSRT090049 SUSE SUSE-SA:2009:007 SUSE SUSE-SA:2009:018 SUSE SUSE-SR:2009:006 SUSE SUSE-SR:2009:010 CERT TA08-340A CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2008-485.htm CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm CONFIRM http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid= MISC http://www.zerodayinitiative.com/advisories/ZDI-08-080/ CONFIRM http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf XF jre-image-processing-privilege-escalation(47048) Buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code, related to a ConvolveOp operation in the Java AWT library.