Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:15259
[Eng]
Version
7
Class
patch
ALTXid
29761
Language
Russian
Severity
NotAvailable
Title
Обновление DSA-2420-1 openjdk-6 - несколько уязвимостей
Description
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform. CVE-2011-3377 The Iced Tea browser plugin included in the openjdk-6 package does not properly enforce the Same Origin Policy on web content served under a domain name which has a common suffix with the required domain name. CVE-2011-3563 The Java Sound component did not properly check for array boundaries. A malicious input or an untrusted Java application or applet could use this flaw to cause Java Virtual Machine to crash or disclose portion of its memory. CVE-2011-5035 The OpenJDK embedded web server did not guard against an excessive number of a request parameters, leading to a denial of service vulnerability involving hash collisions. CVE-2012-0497 It was discovered that Java2D did not properly check graphics rendering objects before passing them to the native renderer. This could lead to JVM crash or Java sandbox bypass. CVE-2012-0501 The ZIP central directory parser used by java.util.zip.ZipFile entered an infinite recursion in native code when processing a crafted ZIP file, leading to a denial of service. CVE-2012-0502 A flaw was found in the AWT KeyboardFocusManager class that could allow untrusted Java applets to acquire keyboard focus and possibly steal sensitive information. CVE-2012-0503 The java.util.TimeZone.setDefault method lacked a security manager invocation, allowing an untrusted Java application or applet to set a new default time zone. CVE-2012-0505 The Java serialization code leaked references to serialization exceptions, possibly leaking critical objects to untrusted code in Java applets and applications. CVE-2012-0506 It was discovered that CORBA implementation in Java did not properly protect repository identifiers on certain Corba objects. This could have been used to perform modification of the data that should have been immutable. CVE-2012-0507 The AtomicReferenceArray class implementation did not properly check if the array is of an expected Object[] type. A malicious Java application or applet could use this flaw to cause Java Virtual Machine to crash or bypass Java sandbox restrictions
Family
unix
Platform
Debian GNU/kFreeBSD 6.0
Debian GNU/Linux 6.0
Product
openjdk-6
Reference
VENDOR: DSA-2420-1
VENDOR: DSA-2420-1
Id:
DSA-2420-1
Reference:
http://lists.debian.org/debian-security-announce/2012/msg00048.html
CVE: CVE-2011-3377
CVE: CVE-2011-3377
Id:
CVE-2011-3377
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3377
Comment
: The web browser plug-in in IcedTea-Web 1.0.x before 1.0.6 and 1.1.x before 1.1.4 allows remote attackers to bypass the Same Origin Policy (SOP) and execute arbitrary script or establish network connections to unintended hosts via an applet whose origin has the same second-level domain, but a different sub-domain than the targeted domain.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=742515 (MISC)
RHSA-2011:1441 (REDHAT)
DSA-2420 (DEBIAN)
76940 (OSVDB)
USN-1263-1 (UBUNTU)
50610 (BID)
http://dbhole.wordpress.com/2011/11/08/icedtea-web-1-0-6-and-1-1-4-security-releases-released/ (CONFIRM)
openSUSE-SU-2012:0371 (SUSE)
CVE: CVE-2011-3563
CVE: CVE-2011-3563
Id:
CVE-2011-3563
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3563
Comment
: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.
CVSSv2 Score:
6.4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html (CONFIRM)
48589 (SECUNIA)
49198 (SECUNIA)
SUSE-SU-2012:1013 (SUSE)
48692 (SECUNIA)
48948 (SECUNIA)
48950 (SECUNIA)
48915 (SECUNIA)
MDVSA-2013:150 (MANDRIVA)
RHSA-2013:1455 (REDHAT)
DSA-2420 (DEBIAN)
GLSA-201406-32 (GENTOO)
SSRT100867 (HP)
HPSBUX02777 (HP)
SSRT100805 (HP)
HPSBUX02757 (HP)
HPSBUX02784 (HP)
52012 (BID)
oval:org.mitre.oval:def:14942 (OVAL)
RHSA-2012:1080 (REDHAT)
HPSBMU02799 (HP)
SUSE-SU-2012:0881 (SUSE)
RHSA-2012:0702 (REDHAT)
RHSA-2012:0514 (REDHAT)
RHSA-2012:0508 (REDHAT)
SUSE-SU-2012:0734 (SUSE)
SUSE-SU-2012:0603 (SUSE)
SUSE-SU-2012:0602 (SUSE)
48073 (SECUNIA)
48074 (SECUNIA)
CVE: CVE-2011-5035
CVE: CVE-2011-5035
Id:
CVE-2011-5035
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035
Comment
: Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
20 (Improper Input Validation)
References:
http://www.ocert.org/advisories/ocert-2011-003.html (MISC)
http://www.nruns.com/_downloads/advisory28122011.pdf (MISC)
VU#903934 (CERT-VN)
https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py (MISC)
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html (CONFIRM)
48589 (SECUNIA)
20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table (BUGTRAQ)
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html (CONFIRM)
48950 (SECUNIA)
MDVSA-2013:150 (MANDRIVA)
RHSA-2013:1455 (REDHAT)
DSA-2420 (DEBIAN)
HPSBST02955 (HP)
57126 (SECUNIA)
GLSA-201406-32 (GENTOO)
SSRT100867 (HP)
HPSBUX02757 (HP)
HPSBUX02784 (HP)
oval:org.mitre.oval:def:16908 (OVAL)
HPSBMU02799 (HP)
RHSA-2012:0514 (REDHAT)
SUSE-SU-2012:0603 (SUSE)
48073 (SECUNIA)
48074 (SECUNIA)
CVE: CVE-2012-0497
CVE: CVE-2012-0497
Id:
CVE-2012-0497
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0497
Comment
: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
References:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html (CONFIRM)
48589 (SECUNIA)
48950 (SECUNIA)
MDVSA-2013:150 (MANDRIVA)
RHSA-2013:1455 (REDHAT)
DSA-2420 (DEBIAN)
GLSA-201406-32 (GENTOO)
SSRT100867 (HP)
HPSBUX02757 (HP)
HPSBUX02784 (HP)
52009 (BID)
oval:org.mitre.oval:def:14772 (OVAL)
HPSBMU02799 (HP)
RHSA-2012:0514 (REDHAT)
SUSE-SU-2012:0603 (SUSE)
48074 (SECUNIA)
CVE: CVE-2012-0501
CVE: CVE-2012-0501
Id:
CVE-2012-0501
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0501
Comment
: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html (CONFIRM)
48589 (SECUNIA)
48692 (SECUNIA)
48948 (SECUNIA)
48950 (SECUNIA)
48915 (SECUNIA)
MDVSA-2013:150 (MANDRIVA)
RHSA-2013:1455 (REDHAT)
DSA-2420 (DEBIAN)
GLSA-201406-32 (GENTOO)
SSRT100867 (HP)
SSRT100805 (HP)
HPSBUX02757 (HP)
HPSBUX02784 (HP)
52013 (BID)
oval:org.mitre.oval:def:15069 (OVAL)
HPSBMU02799 (HP)
RHSA-2012:0514 (REDHAT)
RHSA-2012:0508 (REDHAT)
SUSE-SU-2012:0603 (SUSE)
SUSE-SU-2012:0602 (SUSE)
48073 (SECUNIA)
48074 (SECUNIA)
CVE: CVE-2012-0502
CVE: CVE-2012-0502
Id:
CVE-2012-0502
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0502
Comment
: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.
CVSSv2 Score:
6.4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html (CONFIRM)
48589 (SECUNIA)
49198 (SECUNIA)
SUSE-SU-2012:1013 (SUSE)
48692 (SECUNIA)
48948 (SECUNIA)
48950 (SECUNIA)
48915 (SECUNIA)
RHSA-2013:1455 (REDHAT)
DSA-2420 (DEBIAN)
GLSA-201406-32 (GENTOO)
SSRT100867 (HP)
HPSBUX02777 (HP)
SSRT100805 (HP)
HPSBUX02757 (HP)
HPSBUX02784 (HP)
52011 (BID)
oval:org.mitre.oval:def:14900 (OVAL)
RHSA-2012:1080 (REDHAT)
HPSBMU02799 (HP)
SUSE-SU-2012:0881 (SUSE)
RHSA-2012:0702 (REDHAT)
RHSA-2012:0514 (REDHAT)
RHSA-2012:0508 (REDHAT)
SUSE-SU-2012:0734 (SUSE)
SUSE-SU-2012:0603 (SUSE)
SUSE-SU-2012:0602 (SUSE)
48073 (SECUNIA)
48074 (SECUNIA)
CVE: CVE-2012-0503
CVE: CVE-2012-0503
Id:
CVE-2012-0503
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0503
Comment
: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html (CONFIRM)
48589 (SECUNIA)
49198 (SECUNIA)
SUSE-SU-2012:1013 (SUSE)
48692 (SECUNIA)
48948 (SECUNIA)
48950 (SECUNIA)
48915 (SECUNIA)
RHSA-2013:1455 (REDHAT)
DSA-2420 (DEBIAN)
GLSA-201406-32 (GENTOO)
SSRT100867 (HP)
HPSBUX02777 (HP)
SSRT100805 (HP)
HPSBUX02757 (HP)
HPSBUX02784 (HP)
52018 (BID)
oval:org.mitre.oval:def:14813 (OVAL)
RHSA-2012:1080 (REDHAT)
HPSBMU02799 (HP)
SUSE-SU-2012:0881 (SUSE)
RHSA-2012:0702 (REDHAT)
RHSA-2012:0514 (REDHAT)
RHSA-2012:0508 (REDHAT)
SUSE-SU-2012:0734 (SUSE)
SUSE-SU-2012:0603 (SUSE)
SUSE-SU-2012:0602 (SUSE)
48073 (SECUNIA)
48074 (SECUNIA)
CVE: CVE-2012-0505
CVE: CVE-2012-0505
Id:
CVE-2012-0505
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0505
Comment
: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html (CONFIRM)
48589 (SECUNIA)
49198 (SECUNIA)
SUSE-SU-2012:1013 (SUSE)
48692 (SECUNIA)
48948 (SECUNIA)
48950 (SECUNIA)
48915 (SECUNIA)
RHSA-2013:1455 (REDHAT)
DSA-2420 (DEBIAN)
GLSA-201406-32 (GENTOO)
SSRT100867 (HP)
HPSBUX02777 (HP)
SSRT100805 (HP)
HPSBUX02757 (HP)
HPSBUX02784 (HP)
52017 (BID)
oval:org.mitre.oval:def:13976 (OVAL)
RHSA-2012:1080 (REDHAT)
HPSBMU02799 (HP)
SUSE-SU-2012:0881 (SUSE)
RHSA-2012:0702 (REDHAT)
RHSA-2012:0514 (REDHAT)
RHSA-2012:0508 (REDHAT)
SUSE-SU-2012:0734 (SUSE)
SUSE-SU-2012:0603 (SUSE)
SUSE-SU-2012:0602 (SUSE)
48073 (SECUNIA)
48074 (SECUNIA)
CVE: CVE-2012-0506
CVE: CVE-2012-0506
Id:
CVE-2012-0506
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0506
Comment
: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
References:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html (CONFIRM)
48589 (SECUNIA)
49198 (SECUNIA)
SUSE-SU-2012:1013 (SUSE)
48692 (SECUNIA)
48948 (SECUNIA)
48950 (SECUNIA)
48915 (SECUNIA)
RHSA-2013:1455 (REDHAT)
DSA-2420 (DEBIAN)
GLSA-201406-32 (GENTOO)
SSRT100867 (HP)
HPSBUX02777 (HP)
SSRT100805 (HP)
HPSBUX02757 (HP)
HPSBUX02784 (HP)
52014 (BID)
oval:org.mitre.oval:def:14082 (OVAL)
RHSA-2012:1080 (REDHAT)
HPSBMU02799 (HP)
SUSE-SU-2012:0881 (SUSE)
RHSA-2012:0702 (REDHAT)
RHSA-2012:0514 (REDHAT)
RHSA-2012:0508 (REDHAT)
SUSE-SU-2012:0734 (SUSE)
SUSE-SU-2012:0603 (SUSE)
SUSE-SU-2012:0602 (SUSE)
48073 (SECUNIA)
48074 (SECUNIA)
CVE: CVE-2012-0507
CVE: CVE-2012-0507
Id:
CVE-2012-0507
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0507
Comment
: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
References:
52161 (BID)
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html (CONFIRM)
http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=788994 (CONFIRM)
http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/ (MISC)
http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3 (MISC)
48589 (SECUNIA)
48692 (SECUNIA)
48948 (SECUNIA)
48950 (SECUNIA)
48915 (SECUNIA)
RHSA-2013:1455 (REDHAT)
DSA-2420 (DEBIAN)
SSRT100805 (HP)
HPSBUX02757 (HP)
HPSBUX02784 (HP)
SSRT100867 (HP)
HPSBMU02799 (HP)
RHSA-2012:0514 (REDHAT)
RHSA-2012:0508 (REDHAT)
SUSE-SU-2012:0603 (SUSE)
SUSE-SU-2012:0602 (SUSE)
Content available only for registered users!
ovaldb@altx-soft.com