ID CVE-2011-3551
Summary Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
References
Vulnerable Configurations
  • cpe:2.3:a:sun:jdk:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r28.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r28.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r28.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r28.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r28.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r28.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r28.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r28.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r28.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r28.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r28.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r28.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r27.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r27.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r28.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r28.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_23:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_23:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_24:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_24:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_25:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_25:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_26:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_26:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:*:update_27:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:*:update_27:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_23:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_23:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_24:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_24:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_25:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_25:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_26:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_26:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:*:update_27:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:*:update_27:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 06-01-2018 - 02:29)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
oval via4
accepted 2014-08-18T04:00:59.514-04:00
class vulnerability
contributors
  • name Scott Quint
    organization DTCC
  • name Dragos Prisaca
    organization G2, Inc.
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
  • comment Java SE Runtime Environment 6 is installed
    oval oval:org.mitre.oval:def:16362
  • comment Java SE Runtime Environment 7 is installed
    oval oval:org.mitre.oval:def:16050
  • comment Java SE Development Kit 6 is installed
    oval oval:org.mitre.oval:def:15831
  • comment Java SE Development Kit 7 is installed
    oval oval:org.mitre.oval:def:16278
description Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
family windows
id oval:org.mitre.oval:def:14318
status accepted
submitted 2011-11-25T18:05:01.000-05:00
title Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
version 8
redhat via4
advisories
  • rhsa
    id RHSA-2011:1384
  • rhsa
    id RHSA-2013:1455
rpms
  • java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1
  • java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1
  • java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1
  • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1
  • java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1
  • java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7
  • java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7
  • java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7
  • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7
  • java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7
refmap via4
bid 50224
confirm
gentoo GLSA-201406-32
hp
  • HPSBMU02797
  • HPSBMU02799
  • HPSBUX02730
  • SSRT100710
  • SSRT100867
sectrack 1026215
secunia 48308
suse SUSE-SU-2012:0114
ubuntu USN-1263-1
xf oracle-jre-2d-unspecified(70842)
Last major update 06-01-2018 - 02:29
Published 19-10-2011 - 21:55
Back to Top