Search for vulnerabilities
Vulnerability ID | VCID-mkkp-fztz-aaad |
Aliases |
CVE-2008-5353
|
Summary | CVE-2008-5353 OpenJDK calendar object deserialization allows privilege escalation (6734167) |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 9.0 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Data source | Exploit-DB |
---|---|
Date added | May 19, 2009 |
Description | Apple Mac OSX - Java applet Remote Deserialization Remote (2) |
Ransomware campaign use | Known |
Source publication date | May 20, 2009 |
Exploit type | remote |
Platform | osx |
Data source | Metasploit |
---|---|
Description | This module exploits a flaw in the deserialization of Calendar objects in the Sun JVM. The payload can be either a native payload which is generated as an executable and dropped/executed on the target or a shell from within the Java applet in the target browser. The affected Java versions are JDK and JRE 6 Update 10 and earlier, JDK and JRE 5.0 Update 16 and earlier, SDK and JRE 1.4.2_18 and earlier (SDK and JRE 1.3.1 are not affected). |
Note | {} |
Ransomware campaign use | Unknown |
Source publication date | Dec. 3, 2008 |
Platform | Linux,OSX,Solaris,Windows |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/java_calendar_deserialize.rb |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.99411 |
EPSS Score | 0.88806 |
Published At | March 29, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |