Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTA-2007-AVI-121
Vulnerability from certfr_avis
None
Description
Plusieurs vulnérabilités ont été découvertes dans les environnements Java de Sun. Ces vulnérabilités peuvent être exploitées par des applets de niveau de confiance nul afin d'accéder en lecture, écriture et/ou exécution à des fichiers du système. L'exploitation de certaines de ces vulnérabilités permettent de plus à un utilisateur malintentionné d'accéder à des privilèges plus élevés. L'exécution de code arbitraire à distance est alors possible.
Solution
Les version 1.3.1.20, 1.4.2.12 et 1.5.0.06 remédient à ces vulnérabilités. Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Systèmes HP-UX B11.11 et 11.23 avec les de machines java suivantes :
- JRE et SDK 1.3.x antérieures à la version 1.3.1.20 ;
- JRE et SDK 1.4.x antérieures à la version 1.4.2.12 ;
- JDK et JRE 1.5.x antérieures à la version 1.5.0.06.
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cP\u003eSyst\u00e8mes HP-UX B11.11 et 11.23 avec les de machines java suivantes :\u003c/P\u003e \u003cUL\u003e \u003cLI\u003eJRE et SDK 1.3.x ant\u00e9rieures \u00e0 la version 1.3.1.20 ;\u003c/LI\u003e \u003cLI\u003eJRE et SDK 1.4.x ant\u00e9rieures \u00e0 la version 1.4.2.12 ;\u003c/LI\u003e \u003cLI\u003eJDK et JRE 1.5.x ant\u00e9rieures \u00e0 la version 1.5.0.06.\u003c/LI\u003e \u003c/UL\u003e", "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les environnements\nJava de Sun. Ces vuln\u00e9rabilit\u00e9s peuvent \u00eatre exploit\u00e9es par des applets\nde niveau de confiance nul afin d\u0027acc\u00e9der en lecture, \u00e9criture et/ou\nex\u00e9cution \u00e0 des fichiers du syst\u00e8me. L\u0027exploitation de certaines de ces\nvuln\u00e9rabilit\u00e9s permettent de plus \u00e0 un utilisateur malintentionn\u00e9\nd\u0027acc\u00e9der \u00e0 des privil\u00e8ges plus \u00e9lev\u00e9s. L\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance est alors possible.\n\n## Solution\n\nLes version 1.3.1.20, 1.4.2.12 et 1.5.0.06 rem\u00e9dient \u00e0 ces\nvuln\u00e9rabilit\u00e9s. Se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour\nl\u0027obtention des correctifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2007-0243", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0243" }, { "name": "CVE-2006-6731", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6731" }, { "name": "CVE-2006-6745", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6745" } ], "initial_release_date": "2007-03-13T00:00:00", "last_revision_date": "2007-03-13T00:00:00", "links": [ { "title": "Document du CERTA CERTA-2006-AVI-570 du 22 d\u00e9cembre 2006 :", "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2006-AVI-570/index.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 HP HPSBUX02196 du 09 mars 2007 :", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX02196" } ], "reference": "CERTA-2007-AVI-121", "revisions": [ { "description": "version initiale.", "revision_date": "2007-03-13T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": null, "title": "Vuln\u00e9rabilit\u00e9 de la machine Java sous HP-UX", "vendor_advisories": [ { "published_at": null, "title": "Bulletin HP HPSBUX02196 du 09 mars 2007", "url": null } ] }
CVE-2007-0243 (GCVE-0-2007-0243)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:12:17.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20070117 ZDI-07-005: Sun Microsystems Java GIF File Parsing Memory Corruption Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/457159/100/0/threaded" }, { "name": "102760", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102760-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "24468", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24468" }, { "name": "RHSA-2007:0166", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0166.html" }, { "name": "VU#388289", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/388289" }, { "name": "HPSBUX02196", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "26049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26049" }, { "name": "ADV-2007-1814", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1814" }, { "name": "24202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24202" }, { "name": "20070121 Sun Microsystems Java GIF File Parsing Memory Corruption Vulnerability Prove Of Concept Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/457638/100/0/threaded" }, { "name": "25283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25283" }, { "name": "32834", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/32834" }, { "name": "24189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24189" }, { "name": "SSRT071318", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "SUSE-SA:2007:045", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_45_java.html" }, { "name": "APPLE-SA-2007-12-14", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "2158", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2158" }, { "name": "1017520", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017520" }, { "name": "RHSA-2007:0956", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html" }, { "name": "oval:org.mitre.oval:def:11073", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11073" }, { "name": "26645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26645" }, { "name": "RHSA-2007:0167", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0167.html" }, { "name": "26119", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26119" }, { "name": "23757", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23757" }, { "name": "22085", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22085" }, { "name": "ADV-2007-4224", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "24993", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24993" }, { "name": "28115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28115" }, { "name": "RHSA-2008:0261", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-005.html" }, { "name": "ADV-2007-0211", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0211" }, { "name": "27203", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27203" }, { "name": "jre-gif-bo(31537)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31537" }, { "name": "ADV-2007-0936", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0936" }, { "name": "GLSA-200702-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200702-08.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html" }, { "name": "GLSA-200702-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-07.xml" }, { "name": "TA07-022A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-022A.html" }, { "name": "BEA07-172.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/242" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20070117 ZDI-07-005: Sun Microsystems Java GIF File Parsing Memory Corruption Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/457159/100/0/threaded" }, { "name": "102760", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102760-1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "24468", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24468" }, { "name": "RHSA-2007:0166", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0166.html" }, { "name": "VU#388289", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/388289" }, { "name": "HPSBUX02196", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "26049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26049" }, { "name": "ADV-2007-1814", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1814" }, { "name": "24202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24202" }, { "name": "20070121 Sun Microsystems Java GIF File Parsing Memory Corruption Vulnerability Prove Of Concept Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/457638/100/0/threaded" }, { "name": "25283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25283" }, { "name": "32834", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/32834" }, { "name": "24189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24189" }, { "name": "SSRT071318", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "SUSE-SA:2007:045", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_45_java.html" }, { "name": "APPLE-SA-2007-12-14", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "2158", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2158" }, { "name": "1017520", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017520" }, { "name": "RHSA-2007:0956", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html" }, { "name": "oval:org.mitre.oval:def:11073", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11073" }, { "name": "26645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26645" }, { "name": "RHSA-2007:0167", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0167.html" }, { "name": "26119", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26119" }, { "name": "23757", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23757" }, { "name": "22085", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22085" }, { "name": "ADV-2007-4224", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "24993", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24993" }, { "name": "28115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28115" }, { "name": "RHSA-2008:0261", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-005.html" }, { "name": "ADV-2007-0211", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0211" }, { "name": "27203", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27203" }, { "name": "jre-gif-bo(31537)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31537" }, { "name": "ADV-2007-0936", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0936" }, { "name": "GLSA-200702-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200702-08.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html" }, { "name": "GLSA-200702-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-07.xml" }, { "name": "TA07-022A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-022A.html" }, { "name": "BEA07-172.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/242" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0243", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20070117 ZDI-07-005: Sun Microsystems Java GIF File Parsing Memory Corruption Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/457159/100/0/threaded" }, { "name": "102760", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102760-1" }, { "name": "http://docs.info.apple.com/article.html?artnum=307177", "refsource": "MISC", "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "24468", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24468" }, { "name": "RHSA-2007:0166", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0166.html" }, { "name": "VU#388289", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/388289" }, { "name": "HPSBUX02196", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "26049", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26049" }, { "name": "ADV-2007-1814", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1814" }, { "name": "24202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24202" }, { "name": "20070121 Sun Microsystems Java GIF File Parsing Memory Corruption Vulnerability Prove Of Concept Exploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/457638/100/0/threaded" }, { "name": "25283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25283" }, { "name": "32834", "refsource": "OSVDB", "url": "http://osvdb.org/32834" }, { "name": "24189", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24189" }, { "name": "SSRT071318", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "SUSE-SA:2007:045", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_45_java.html" }, { "name": "APPLE-SA-2007-12-14", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "2158", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2158" }, { "name": "1017520", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017520" }, { "name": "RHSA-2007:0956", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html" }, { "name": "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html", "refsource": "CONFIRM", "url": "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html" }, { "name": "oval:org.mitre.oval:def:11073", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11073" }, { "name": "26645", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26645" }, { "name": "RHSA-2007:0167", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0167.html" }, { "name": "26119", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26119" }, { "name": "23757", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23757" }, { "name": "22085", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22085" }, { "name": "ADV-2007-4224", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "24993", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24993" }, { "name": "28115", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28115" }, { "name": "RHSA-2008:0261", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-005.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-005.html" }, { "name": "ADV-2007-0211", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0211" }, { "name": "27203", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27203" }, { "name": "jre-gif-bo(31537)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31537" }, { "name": "ADV-2007-0936", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0936" }, { "name": "GLSA-200702-08", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200702-08.xml" }, { "name": "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html", "refsource": "CONFIRM", "url": "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html" }, { "name": "GLSA-200702-07", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-07.xml" }, { "name": "TA07-022A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-022A.html" }, { "name": "BEA07-172.00", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/242" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0243", "datePublished": "2007-01-17T22:00:00", "dateReserved": "2007-01-16T00:00:00", "dateUpdated": "2024-08-07T12:12:17.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6745 (GCVE-0-2006-6745)
Vulnerability from cvelistv5
- n/a
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:42:06.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21673", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21673" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "24468", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24468" }, { "name": "HPSBUX02196", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "26049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26049" }, { "name": "RHSA-2007:0062", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "name": "ADV-2007-1814", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1814" }, { "name": "25283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25283" }, { "name": "oval:org.mitre.oval:def:9621", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9621" }, { "name": "24099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24099" }, { "name": "25404", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25404" }, { "name": "24189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24189" }, { "name": "SSRT071318", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "SUSE-SA:2007:045", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_45_java.html" }, { "name": "APPLE-SA-2007-12-14", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "SUSE-SA:2007:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html" }, { "name": "SUSE-SA:2007:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "name": "26119", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26119" }, { "name": "23445", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23445" }, { "name": "ADV-2007-4224", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "23650", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23650" }, { "name": "23835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23835" }, { "name": "1017426", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017426" }, { "name": "RHSA-2007:0073", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "name": "VU#102289", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/102289" }, { "name": "GLSA-200705-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml" }, { "name": "28115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28115" }, { "name": "102731", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102731-1" }, { "name": "BEA07-171.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/240" }, { "name": "ADV-2006-5074", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/5074" }, { "name": "ADV-2007-0936", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0936" }, { "name": "GLSA-200702-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200702-08.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html" }, { "name": "TA07-022A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-022A.html" }, { "name": "GLSA-200701-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200701-15.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, and Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, allow attackers to develop Java applets or applications that are able to gain privileges, related to serialization in JRE." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21673", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21673" }, { "tags": [ "x_refsource_MISC" ], "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "24468", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24468" }, { "name": "HPSBUX02196", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "26049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26049" }, { "name": "RHSA-2007:0062", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "name": "ADV-2007-1814", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1814" }, { "name": "25283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25283" }, { "name": "oval:org.mitre.oval:def:9621", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9621" }, { "name": "24099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24099" }, { "name": "25404", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25404" }, { "name": "24189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24189" }, { "name": "SSRT071318", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "SUSE-SA:2007:045", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_45_java.html" }, { "name": "APPLE-SA-2007-12-14", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "SUSE-SA:2007:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html" }, { "name": "SUSE-SA:2007:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "name": "26119", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26119" }, { "name": "23445", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23445" }, { "name": "ADV-2007-4224", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "23650", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23650" }, { "name": "23835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23835" }, { "name": "1017426", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017426" }, { "name": "RHSA-2007:0073", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "name": "VU#102289", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/102289" }, { "name": "GLSA-200705-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml" }, { "name": "28115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28115" }, { "name": "102731", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102731-1" }, { "name": "BEA07-171.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/240" }, { "name": "ADV-2006-5074", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/5074" }, { "name": "ADV-2007-0936", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0936" }, { "name": "GLSA-200702-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200702-08.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html" }, { "name": "TA07-022A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-022A.html" }, { "name": "GLSA-200701-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200701-15.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6745", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, and Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, allow attackers to develop Java applets or applications that are able to gain privileges, related to serialization in JRE." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21673", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21673" }, { "name": "http://docs.info.apple.com/article.html?artnum=307177", "refsource": "MISC", "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "24468", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24468" }, { "name": "HPSBUX02196", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "26049", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26049" }, { "name": "RHSA-2007:0062", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "name": "ADV-2007-1814", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1814" }, { "name": "25283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25283" }, { "name": "oval:org.mitre.oval:def:9621", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9621" }, { "name": "24099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24099" }, { "name": "25404", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25404" }, { "name": "24189", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24189" }, { "name": "SSRT071318", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "SUSE-SA:2007:045", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_45_java.html" }, { "name": "APPLE-SA-2007-12-14", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "SUSE-SA:2007:003", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html" }, { "name": "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html", "refsource": "CONFIRM", "url": "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html" }, { "name": "SUSE-SA:2007:010", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "name": "26119", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26119" }, { "name": "23445", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23445" }, { "name": "ADV-2007-4224", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "23650", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23650" }, { "name": "23835", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23835" }, { "name": "1017426", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017426" }, { "name": "RHSA-2007:0073", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "name": "VU#102289", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/102289" }, { "name": "GLSA-200705-20", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml" }, { "name": "28115", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28115" }, { "name": "102731", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102731-1" }, { "name": "BEA07-171.00", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/240" }, { "name": "ADV-2006-5074", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/5074" }, { "name": "ADV-2007-0936", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0936" }, { "name": "GLSA-200702-08", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200702-08.xml" }, { "name": "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html", "refsource": "CONFIRM", "url": "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html" }, { "name": "TA07-022A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-022A.html" }, { "name": "GLSA-200701-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200701-15.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6745", "datePublished": "2006-12-26T23:00:00", "dateReserved": "2006-12-26T00:00:00", "dateUpdated": "2024-08-07T20:42:06.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6731 (GCVE-0-2006-6731)
Vulnerability from cvelistv5
- n/a
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:34:00.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21675", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21675" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "ADV-2006-5073", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/5073" }, { "name": "24468", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24468" }, { "name": "HPSBUX02196", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "102729", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102729-1" }, { "name": "RHSA-2007:0062", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "name": "ADV-2007-1814", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1814" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://scary.beasts.org/security/CESA-2005-008.txt" }, { "name": "25283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25283" }, { "name": "24099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24099" }, { "name": "25404", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25404" }, { "name": "oval:org.mitre.oval:def:10134", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10134" }, { "name": "24189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24189" }, { "name": "SSRT071318", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "APPLE-SA-2007-12-14", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "SUSE-SA:2007:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html" }, { "name": "VU#939609", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/939609" }, { "name": "SUSE-SA:2007:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "name": "RHSA-2007:0072", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0072.html" }, { "name": "23445", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23445" }, { "name": "ADV-2007-4224", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "23650", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23650" }, { "name": "23835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23835" }, { "name": "1017425", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017425" }, { "name": "RHSA-2007:0073", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "name": "VU#149457", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/149457" }, { "name": "GLSA-200705-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml" }, { "name": "28115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28115" }, { "name": "ADV-2007-0936", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0936" }, { "name": "GLSA-200702-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200702-08.xml" }, { "name": "TA07-022A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-022A.html" }, { "name": "GLSA-200701-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200701-15.xml" }, { "name": "BEA07-174.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/243" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21675", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21675" }, { "tags": [ "x_refsource_MISC" ], "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "ADV-2006-5073", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/5073" }, { "name": "24468", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24468" }, { "name": "HPSBUX02196", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "102729", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102729-1" }, { "name": "RHSA-2007:0062", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "name": "ADV-2007-1814", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1814" }, { "tags": [ "x_refsource_MISC" ], "url": "http://scary.beasts.org/security/CESA-2005-008.txt" }, { "name": "25283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25283" }, { "name": "24099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24099" }, { "name": "25404", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25404" }, { "name": "oval:org.mitre.oval:def:10134", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10134" }, { "name": "24189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24189" }, { "name": "SSRT071318", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "APPLE-SA-2007-12-14", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "SUSE-SA:2007:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html" }, { "name": "VU#939609", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/939609" }, { "name": "SUSE-SA:2007:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "name": "RHSA-2007:0072", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0072.html" }, { "name": "23445", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23445" }, { "name": "ADV-2007-4224", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "23650", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23650" }, { "name": "23835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23835" }, { "name": "1017425", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017425" }, { "name": "RHSA-2007:0073", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "name": "VU#149457", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/149457" }, { "name": "GLSA-200705-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml" }, { "name": "28115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28115" }, { "name": "ADV-2007-0936", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0936" }, { "name": "GLSA-200702-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200702-08.xml" }, { "name": "TA07-022A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-022A.html" }, { "name": "GLSA-200701-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200701-15.xml" }, { "name": "BEA07-174.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/243" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6731", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21675", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21675" }, { "name": "http://docs.info.apple.com/article.html?artnum=307177", "refsource": "MISC", "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "ADV-2006-5073", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/5073" }, { "name": "24468", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24468" }, { "name": "HPSBUX02196", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "102729", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102729-1" }, { "name": "RHSA-2007:0062", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "name": "ADV-2007-1814", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1814" }, { "name": "http://scary.beasts.org/security/CESA-2005-008.txt", "refsource": "MISC", "url": "http://scary.beasts.org/security/CESA-2005-008.txt" }, { "name": "25283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25283" }, { "name": "24099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24099" }, { "name": "25404", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25404" }, { "name": "oval:org.mitre.oval:def:10134", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10134" }, { "name": "24189", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24189" }, { "name": "SSRT071318", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00876579" }, { "name": "APPLE-SA-2007-12-14", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "SUSE-SA:2007:003", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html" }, { "name": "VU#939609", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/939609" }, { "name": "SUSE-SA:2007:010", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "name": "RHSA-2007:0072", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0072.html" }, { "name": "23445", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23445" }, { "name": "ADV-2007-4224", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "23650", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23650" }, { "name": "23835", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23835" }, { "name": "1017425", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017425" }, { "name": "RHSA-2007:0073", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "name": "VU#149457", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/149457" }, { "name": "GLSA-200705-20", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml" }, { "name": "28115", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28115" }, { "name": "ADV-2007-0936", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0936" }, { "name": "GLSA-200702-08", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200702-08.xml" }, { "name": "TA07-022A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-022A.html" }, { "name": "GLSA-200701-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200701-15.xml" }, { "name": "BEA07-174.00", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/243" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6731", "datePublished": "2006-12-26T23:00:00", "dateReserved": "2006-12-26T00:00:00", "dateUpdated": "2024-08-07T20:34:00.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.