{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2008-3111","title":"Title"},{"category":"description","text":"Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2008-3111","url":"https://www.suse.com/security/cve/CVE-2008-3111"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 407935 for CVE-2008-3111","url":"https://bugzilla.suse.com/407935"},{"category":"external","summary":"SUSE Bug 418499 for CVE-2008-3111","url":"https://bugzilla.suse.com/418499"},{"category":"external","summary":"Advisory link for SUSE-SA:2008:042","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZKNB2OTYDNHKGVCWRJH2FEJC6B4BTLT/#SZKNB2OTYDNHKGVCWRJH2FEJC6B4BTLT"},{"category":"external","summary":"Advisory link for SUSE-SA:2008:043","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4752OIXIYOPG4CBJ6JGLL4R7LB5CUVLZ/#4752OIXIYOPG4CBJ6JGLL4R7LB5CUVLZ"},{"category":"external","summary":"Advisory link for SUSE-SA:2008:045","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTK4YQEPH4S7DY43UF72YBUWQFLIOUN4/#XTK4YQEPH4S7DY43UF72YBUWQFLIOUN4"}],"title":"SUSE CVE CVE-2008-3111","tracking":{"current_release_date":"2026-03-16T00:50:16Z","generator":{"date":"2023-02-15T06:07:43Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2008-3111","initial_release_date":"2023-02-15T06:07:43Z","revision_history":[{"date":"2023-02-15T06:07:43Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:16:10Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:38:34Z","number":"4","summary":"Current version"},{"date":"2026-03-16T00:50:16Z","number":"5","summary":"severity changed from critical to important"}],"status":"interim","version":"5"}}}