3.5

CVE-2011-0311

The class file parser in IBM Java before 1.4.2 SR13 FP9, as used in IBM Runtimes for Java Technology 5.0.0 before SR13 and 6.0.0 before SR10, allows remote authenticated users to cause a denial of service (JVM segmentation fault, and possibly memory consumption or an infinite loop) via a crafted attribute length field in a class file, which triggers a buffer over-read.

Data is provided by the National Vulnerability Database (NVD)
IbmJava Version <= 1.4.2.13.8
IbmJava Version1.4.2
IbmJava Version1.4.2.13
IbmJava Version1.4.2.13.1
IbmJava Version1.4.2.13.2
IbmJava Version1.4.2.13.3
IbmJava Version1.4.2.13.4
IbmJava Version1.4.2.13.5
IbmJava Version1.4.2.13.6
IbmJava Version1.4.2.13.7
IbmRuntimes For Java Technology Version <= 5.0.12.4
IbmRuntimes For Java Technology Version <= 6.0.9.0
IbmRuntimes For Java Technology Version5.0.11.0
IbmRuntimes For Java Technology Version5.0.11.1
IbmRuntimes For Java Technology Version5.0.11.2
IbmRuntimes For Java Technology Version5.0.12.0
IbmRuntimes For Java Technology Version5.0.12.1
IbmRuntimes For Java Technology Version5.0.12.2
IbmRuntimes For Java Technology Version5.0.12.3
IbmRuntimes For Java Technology Version6.0.1.0
IbmRuntimes For Java Technology Version6.0.2.0
IbmRuntimes For Java Technology Version6.0.3.0
IbmRuntimes For Java Technology Version6.0.4.0
IbmRuntimes For Java Technology Version6.0.5.0
IbmRuntimes For Java Technology Version6.0.6.0
IbmRuntimes For Java Technology Version6.0.7.0
IbmRuntimes For Java Technology Version6.0.8.0
IbmRuntimes For Java Technology Version6.0.8.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.79% 0.729
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 3.5 6.8 2.9
AV:N/AC:M/Au:S/C:N/I:N/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.