cnvd-2015-00570
Vulnerability from cnvd

Title: Oracle Java SE/Java SE Embedded/JRockit JSSE子件存在未明漏洞

Description:

Oracle Java Runtime Environment是一款为JAVA应用程序提供可靠的运行环境的解决方案。Oracle JRockit是一个全面的Java运行时解决方案组合,包括了行业最快的标准Java解决方案。

Oracle Java SE/Java SE Embedded/JRockit JSSE子件存在未明安全漏洞,攻击者可以构建不可信Java Web Start应用和不可信Java Applet,诱使用户解析来触发,影响系统保密性和完整性。

Severity:

Patch Name: Oracle Java SE/Java SE Embedded/JRockit JSSE子件存在未明漏洞的补丁

Patch Description:

Oracle Java Runtime Environment是一款为JAVA应用程序提供可靠的运行环境的解决方案。Oracle JRockit是一个全面的Java运行时解决方案组合,包括了行业最快的标准Java解决方案。Oracle Java SE/Java SE Embedded/JRockit JSSE子件存在未明安全漏洞,攻击者可以构建不可信Java Web Start应用和不可信Java Applet,诱使用户解析来触发,影响系统保密性和完整性。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Reference: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Impacted products
Name
['Oracle Java SE 8u25', 'Oracle Java SE 6u85', 'Oracle Java SE 7u72', 'Oracle Java SE 5.0u75', 'Oracle Java SE Embedded 7u71', 'Oracle Java SE Embedded 8u6', 'Oracle JRockit R27.8.4', 'Oracle JRockit R28.3.4']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2014-6593"
    }
  },
  "description": "Oracle Java Runtime Environment\u662f\u4e00\u6b3e\u4e3aJAVA\u5e94\u7528\u7a0b\u5e8f\u63d0\u4f9b\u53ef\u9760\u7684\u8fd0\u884c\u73af\u5883\u7684\u89e3\u51b3\u65b9\u6848\u3002Oracle JRockit\u662f\u4e00\u4e2a\u5168\u9762\u7684Java\u8fd0\u884c\u65f6\u89e3\u51b3\u65b9\u6848\u7ec4\u5408\uff0c\u5305\u62ec\u4e86\u884c\u4e1a\u6700\u5feb\u7684\u6807\u51c6Java\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nOracle Java SE/Java SE Embedded/JRockit JSSE\u5b50\u4ef6\u5b58\u5728\u672a\u660e\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u6784\u5efa\u4e0d\u53ef\u4fe1Java Web Start\u5e94\u7528\u548c\u4e0d\u53ef\u4fe1Java Applet\uff0c\u8bf1\u4f7f\u7528\u6237\u89e3\u6790\u6765\u89e6\u53d1\uff0c\u5f71\u54cd\u7cfb\u7edf\u4fdd\u5bc6\u6027\u548c\u5b8c\u6574\u6027\u3002",
  "discovererName": "Oracle",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-00570",
  "openTime": "2015-01-26",
  "patchDescription": "Oracle Java Runtime Environment\u662f\u4e00\u6b3e\u4e3aJAVA\u5e94\u7528\u7a0b\u5e8f\u63d0\u4f9b\u53ef\u9760\u7684\u8fd0\u884c\u73af\u5883\u7684\u89e3\u51b3\u65b9\u6848\u3002Oracle JRockit\u662f\u4e00\u4e2a\u5168\u9762\u7684Java\u8fd0\u884c\u65f6\u89e3\u51b3\u65b9\u6848\u7ec4\u5408\uff0c\u5305\u62ec\u4e86\u884c\u4e1a\u6700\u5feb\u7684\u6807\u51c6Java\u89e3\u51b3\u65b9\u6848\u3002Oracle Java SE/Java SE Embedded/JRockit JSSE\u5b50\u4ef6\u5b58\u5728\u672a\u660e\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u6784\u5efa\u4e0d\u53ef\u4fe1Java Web Start\u5e94\u7528\u548c\u4e0d\u53ef\u4fe1Java Applet\uff0c\u8bf1\u4f7f\u7528\u6237\u89e3\u6790\u6765\u89e6\u53d1\uff0c\u5f71\u54cd\u7cfb\u7edf\u4fdd\u5bc6\u6027\u548c\u5b8c\u6574\u6027\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Oracle Java SE/Java SE Embedded/JRockit JSSE\u5b50\u4ef6\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Oracle Java SE 8u25",
      "Oracle Java SE 6u85",
      "Oracle Java SE  7u72",
      "Oracle Java SE 5.0u75",
      "Oracle Java SE Embedded 7u71",
      "Oracle Java SE Embedded 8u6",
      "Oracle JRockit R27.8.4",
      "Oracle JRockit R28.3.4"
    ]
  },
  "referenceLink": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
  "serverity": "\u4e2d",
  "submitTime": "2015-01-22",
  "title": "Oracle Java SE/Java SE Embedded/JRockit JSSE\u5b50\u4ef6\u5b58\u5728\u672a\u660e\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…