CVE-2005-3906

Multiple unspecified vulnerabilities in reflection APIs in Java SDK and JRE 1.4.2_08 and earlier and JDK and JRE 5.0 Update 3 and earlier allow remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors, a different set of vulnerabilities than CVE-2005-3905. NOTE: this is associated with the "second and third issues" identified in SUNALERT:102003.
References
Link Resource
http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html
http://secunia.com/advisories/17748 Patch Vendor Advisory
http://secunia.com/advisories/17847 Vendor Advisory
http://secunia.com/advisories/18092 Vendor Advisory
http://secunia.com/advisories/18435 Vendor Advisory
http://secunia.com/advisories/18503 Vendor Advisory
http://securitytracker.com/id?1015280
http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1 Patch Vendor Advisory
http://www-1.ibm.com/support/docview.wss?uid=swg21225628
http://www.gentoo.org/security/en/glsa/glsa-200601-10.xml
http://www.kb.cert.org/vuls/id/974188 US Government Resource
http://www.securityfocus.com/bid/15615
http://www.vupen.com/english/advisories/2005/2636 Vendor Advisory
http://www.vupen.com/english/advisories/2005/2675 Vendor Advisory
http://www.vupen.com/english/advisories/2005/2946 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/23251
http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html
http://secunia.com/advisories/17748 Patch Vendor Advisory
http://secunia.com/advisories/17847 Vendor Advisory
http://secunia.com/advisories/18092 Vendor Advisory
http://secunia.com/advisories/18435 Vendor Advisory
http://secunia.com/advisories/18503 Vendor Advisory
http://securitytracker.com/id?1015280
http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1 Patch Vendor Advisory
http://www-1.ibm.com/support/docview.wss?uid=swg21225628
http://www.gentoo.org/security/en/glsa/glsa-200601-10.xml
http://www.kb.cert.org/vuls/id/974188 US Government Resource
http://www.securityfocus.com/bid/15615
http://www.vupen.com/english/advisories/2005/2636 Vendor Advisory
http://www.vupen.com/english/advisories/2005/2675 Vendor Advisory
http://www.vupen.com/english/advisories/2005/2946 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/23251
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.0_02:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_02:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_02:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_02:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_04:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_05:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_05:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_05:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_06:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_06:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_06:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_07:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_07:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_07:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_08:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_08:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_08:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_09:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_09:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_09:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_10:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_10:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_10:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_11:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_11:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_11:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_12:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_12:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_12:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_13:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_13:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_13:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_14:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_14:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_14:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_15:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_15:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_15:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3_02:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3_05:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_01:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_02:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_02:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_02:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_03:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_03:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_03:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_4:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_4:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_4:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1_01:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1_01:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1_01:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1_02:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1_02:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1_02:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1_03:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1_03:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1_03:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_01:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_02:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_03:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_03:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_03:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_04:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_04:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_04:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_05:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_05:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_05:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_08:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_08:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_08:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0_03:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0_03:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0_03:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1:update15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1:update8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*

History

21 Nov 2024, 00:03

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html - () http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html -
References () http://secunia.com/advisories/17748 - Patch, Vendor Advisory () http://secunia.com/advisories/17748 - Patch, Vendor Advisory
References () http://secunia.com/advisories/17847 - Vendor Advisory () http://secunia.com/advisories/17847 - Vendor Advisory
References () http://secunia.com/advisories/18092 - Vendor Advisory () http://secunia.com/advisories/18092 - Vendor Advisory
References () http://secunia.com/advisories/18435 - Vendor Advisory () http://secunia.com/advisories/18435 - Vendor Advisory
References () http://secunia.com/advisories/18503 - Vendor Advisory () http://secunia.com/advisories/18503 - Vendor Advisory
References () http://securitytracker.com/id?1015280 - () http://securitytracker.com/id?1015280 -
References () http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1 - Patch, Vendor Advisory () http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1 - Patch, Vendor Advisory
References () http://www-1.ibm.com/support/docview.wss?uid=swg21225628 - () http://www-1.ibm.com/support/docview.wss?uid=swg21225628 -
References () http://www.gentoo.org/security/en/glsa/glsa-200601-10.xml - () http://www.gentoo.org/security/en/glsa/glsa-200601-10.xml -
References () http://www.kb.cert.org/vuls/id/974188 - US Government Resource () http://www.kb.cert.org/vuls/id/974188 - US Government Resource
References () http://www.securityfocus.com/bid/15615 - () http://www.securityfocus.com/bid/15615 -
References () http://www.vupen.com/english/advisories/2005/2636 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2636 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2005/2675 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2675 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2005/2946 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2946 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23251 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23251 -

Information

Published : 2005-11-30 11:03

Updated : 2024-11-21 00:03


NVD link : CVE-2005-3906

Mitre link : CVE-2005-3906

CVE.ORG link : CVE-2005-3906


JSON object : View

Products Affected

sun

  • jre
  • jdk