Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-3004 (GCVE-0-2007-3004)
Vulnerability from cvelistv5
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2018-10-19T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"rejectedReasons": [
{
"lang": "en",
"value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-3004",
"datePublished": "2007-06-04T17:00:00",
"dateRejected": "2007-07-19T09:00:00",
"dateReserved": "2007-06-04T00:00:00",
"dateUpdated": "2018-10-19T14:57:01",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2007-3004\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-06-04T17:30:00.000\",\"lastModified\":\"2023-11-07T02:00:43.630\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage\"}],\"metrics\":{},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"references\":[]}}"
}
}
CERTA-2008-AVI-008
Vulnerability from certfr_avis
De multiples vulnérabilités sur VMWare ESX Server et VirtualCenter Management Server permettent notamment à une personne malintentionnée distante d'exécuter du code arbitraire.
Description
De multiples vulnérabilités existent sur VMWare ESX Server. Celles-ci concernent des modules ou logiciels utilisés par le serveur et récemment mis à jour : OpenPegasus, Tomcat, Samba, OpenSSL, JRE, util-linux, et Perl. Certaines de ces failles permettent notamment à une personne malintentionnée distante d'exécuter du code arbitraire.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VirtualCenter Management Server 2.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMWare ESX Server 2.0.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMWare ESX Server 3.0.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s existent sur VMWare ESX Server. Celles-ci\nconcernent des modules ou logiciels utilis\u00e9s par le serveur et r\u00e9cemment\nmis \u00e0 jour : OpenPegasus, Tomcat, Samba, OpenSSL, JRE, util-linux, et\nPerl. Certaines de ces failles permettent notamment \u00e0 une personne\nmalintentionn\u00e9e distante d\u0027ex\u00e9cuter du code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-5360",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5360"
},
{
"name": "CVE-2007-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0450"
},
{
"name": "CVE-2007-5135",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5135"
},
{
"name": "CVE-2007-5116",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5116"
},
{
"name": "CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"name": "CVE-2005-2090",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2090"
},
{
"name": "CVE-2007-5398",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5398"
},
{
"name": "CVE-2007-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3108"
},
{
"name": "CVE-2007-4572",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4572"
},
{
"name": "CVE-2006-7195",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7195"
},
{
"name": "CVE-2007-5191",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5191"
}
],
"initial_release_date": "2008-01-08T00:00:00",
"last_revision_date": "2008-01-08T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMWare VMSA-2008-0002 du 07 janvier 2008 :",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000003.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 VMWare VMSA-2008-0001 du 07 janvier 2008 :",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000002.html"
}
],
"reference": "CERTA-2008-AVI-008",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s sur \u003cspan class=\"textit\"\u003eVMWare ESX\nServer\u003c/span\u003e et \u003cspan class=\"textit\"\u003eVirtualCenter Management\nServer\u003c/span\u003e permettent notamment \u00e0 une personne malintentionn\u00e9e\ndistante d\u0027ex\u00e9cuter du code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMWare VMSA-2008-0001 du 07 janvier 2008",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMWare VMSA-2008-0002 du 07 janvier 2008",
"url": null
}
]
}
CERTA-2007-AVI-546
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Java pour Mac OS X.
Description
De multiples vulérabilités de Java pour Mac OS X ont été découvertes. Les vulnérabilités les plus importantes permettent :
- un contournement de la politique de sécurité via une appliquette spécialement conçue permettant la suppression et l'insertion d'objets ;
- une exécution de code arbitraire à distance et une élévation de privilèges via une vulnérabilité de Java 1.4 ;
- une exécution de code arbitraire à distance et une élévation de privilèges via une vulnérabilité de J2SE 5.0.
Solution
Se référer au bulletin de sécurité Apple 307177 pour l'obtention des correctifs (cf. section Documentation).
Mac OS X version 10.4.10 et les versions antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eMac OS X version 10.4.10 et les versions ant\u00e9rieures.\u003c/P\u003e",
"content": "## Description\n\nDe multiples vul\u00e9rabilit\u00e9s de Java pour Mac OS X ont \u00e9t\u00e9 d\u00e9couvertes.\nLes vuln\u00e9rabilit\u00e9s les plus importantes permettent :\n\n- un contournement de la politique de s\u00e9curit\u00e9 via une appliquette\n sp\u00e9cialement con\u00e7ue permettant la suppression et l\u0027insertion\n d\u0027objets ;\n- une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de\n privil\u00e8ges via une vuln\u00e9rabilit\u00e9 de Java 1.4 ;\n- une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de\n privil\u00e8ges via une vuln\u00e9rabilit\u00e9 de J2SE 5.0.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Apple 307177 pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2788"
},
{
"name": "CVE-2006-4339",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4339"
},
{
"name": "CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"name": "CVE-2007-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3698"
},
{
"name": "CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"name": "CVE-2007-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0243"
},
{
"name": "CVE-2007-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
},
{
"name": "CVE-2006-6731",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6731"
},
{
"name": "CVE-2007-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3655"
},
{
"name": "CVE-2007-5862",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5862"
},
{
"name": "CVE-2006-6745",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6745"
},
{
"name": "CVE-2007-4381",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4381"
},
{
"name": "CVE-2007-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3504"
},
{
"name": "CVE-2006-6736",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6736"
},
{
"name": "CVE-2007-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3005"
},
{
"name": "CVE-2007-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2789"
},
{
"name": "CVE-2007-5232",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5232"
},
{
"name": "CVE-2007-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2435"
}
],
"initial_release_date": "2007-12-17T00:00:00",
"last_revision_date": "2007-12-17T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 307177 du 12 d\u00e9cembre 2007 :",
"url": "http://docs.info.apple.com/article.html?artnum=307177"
}
],
"reference": "CERTA-2007-AVI-546",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-12-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Java pour Mac OS X.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Apple 307177 du 12 d\u00e9cembre 2007",
"url": null
}
]
}
CERTA-2007-AVI-348
Vulnerability from certfr_avis
Plusieurs vulnérabilités dans les paquetages java-1.4.2-ibm permettent à un utilisateur malveillant de contourner la politique de sécurité du système vulnérable.
Description
Une première vulnérabilité, liée à Java Web Start, permet à un utilisateur d'élever ses privilèges et d'accéder indûment à des fichiers en lecture et en modification (CVE-2007-2435).
Une seconde vulnérabilité permet à une application (ou à une applet) d'élever ses privilèges et d'exécuter un code arbitraire sur la machine virtuelle (CVE-2007-3004).
Une troisième vulnérabilité permet de bloquer la machine virtuelle, provoquant un déni de service (CVE-2007-3005).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | Sun Java JDK 1.6.x ; | ||
| IBM | N/A | Sun Java JDK 1.5.x ; | ||
| IBM | N/A | Sun Java JRE 1.3.x ; | ||
| IBM | N/A | Sun Java JRE 1.5.x / 5.x ; | ||
| IBM | N/A | Sun Java SDK 1.3.x ; | ||
| IBM | N/A | Sun Java JRE 1.4.x ; | ||
| IBM | N/A | Sun Java JRE 1.6.x / 6.x ; | ||
| IBM | N/A | Sun Java SDK 1.4.x. | ||
| IBM | N/A | Sun Java Enterprise System 5.x (JSSE) 1.x ; |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sun Java JDK 1.6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java JDK 1.5.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java JRE 1.3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java JRE 1.5.x / 5.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java SDK 1.3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java JRE 1.4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java JRE 1.6.x / 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java SDK 1.4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java Enterprise System 5.x (JSSE) 1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne premi\u00e8re vuln\u00e9rabilit\u00e9, li\u00e9e \u00e0 Java Web Start, permet \u00e0 un\nutilisateur d\u0027\u00e9lever ses privil\u00e8ges et d\u0027acc\u00e9der ind\u00fbment \u00e0 des fichiers\nen lecture et en modification (CVE-2007-2435).\n\nUne seconde vuln\u00e9rabilit\u00e9 permet \u00e0 une application (ou \u00e0 une applet)\nd\u0027\u00e9lever ses privil\u00e8ges et d\u0027ex\u00e9cuter un code arbitraire sur la machine\nvirtuelle (CVE-2007-3004).\n\nUne troisi\u00e8me vuln\u00e9rabilit\u00e9 permet de bloquer la machine virtuelle,\nprovoquant un d\u00e9ni de service (CVE-2007-3005).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2788"
},
{
"name": "CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"name": "CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"name": "CVE-2007-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
},
{
"name": "CVE-2007-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3655"
},
{
"name": "CVE-2007-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3005"
},
{
"name": "CVE-2007-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2789"
},
{
"name": "CVE-2007-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2435"
}
],
"initial_release_date": "2007-08-07T00:00:00",
"last_revision_date": "2007-11-16T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200705-23 du 31 mai 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200705-23.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200706-08 du 26 juin 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200706-08.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP OpenView c01269450 du 14 novembre 2007 :",
"url": "http://www4.itrc.hp.com/service/cki/docDisplay.do?docId=c01269450"
},
{
"title": "Avis du CERTA CERTA-2007-AVI-238 du 01 juin 2007 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2007-AVI-238/index.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2007-199 du 23 mai 2007 :",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-199.htm"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2007:045 du 18 juillet 2008 :",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00007.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0829 du 07 ao\u00fbt 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0829.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0818 du 06 ao\u00fbt 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0818.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0817 du 06 ao\u00fbt 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0817.html"
}
],
"reference": "CERTA-2007-AVI-348",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-08-07T00:00:00.000000"
},
{
"description": "modification des syst\u00e8mes affect\u00e9s, ajout des r\u00e9f\u00e9rences CVE et des bulletins de s\u00e9curit\u00e9 des \u00e9diteurs SuSE, Red Hat, Avaya et Gentoo.",
"revision_date": "2007-08-08T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 HP OpenView.",
"revision_date": "2007-11-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans les paquetages java-1.4.2-ibm permettent \u00e0\nun utilisateur malveillant de contourner la politique de s\u00e9curit\u00e9 du\nsyst\u00e8me vuln\u00e9rable.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans la machine Java d\u0027IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis Redhat RHSA-2007:0817-2 du 06 ao\u00fbt 2007",
"url": null
}
]
}
gsd-2007-3004
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2007-3004",
"description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2007-3004",
"references": [
"https://www.suse.com/security/cve/CVE-2007-3004.html",
"https://access.redhat.com/errata/RHSA-2008:0133"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-3004"
],
"details": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2007-3004",
"modified": "2023-12-13T01:21:42.050738Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-3004",
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
}
}
}
}
rhsa-2008:0133
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "IBMJava2-JRE and IBMJava2-SDK packages that correct several security issues\nare available for Red Hat Enterprise Linux 2.1.",
"title": "Topic"
},
{
"category": "general",
"text": "IBM\u0027s 1.3.1 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nA buffer overflow was found in the Java Runtime Environment image-handling\ncode. An untrusted applet or application could use this flaw to elevate its\nprivileges and potentially execute arbitrary code as the user running the\njava virtual machine. (CVE-2007-3004)\n\nAn unspecified vulnerability was discovered in the Java Runtime\nEnvironment. An untrusted applet or application could cause the java\nvirtual machine to become unresponsive. (CVE-2007-3005)\n\nA flaw was found in the applet class loader. An untrusted applet could use\nthis flaw to circumvent network access restrictions, possibly connecting to\nservices hosted on the machine that executed the applet. (CVE-2007-3922)\n\nThese updated packages also add the following enhancements:\n\n* Time zone information has been updated to the latest available\ninformation, 2007h.\n\n* Accessibility support in AWT can now be disabled through a system\nproperty, java.assistive. To support this change, permission to read this\nproperty must be added to /opt/IBMJava2-131/jre/lib/security/java.policy.\nUsers of IBMJava2 who have modified this file should add this following\nline to the grant section:\n\npermission java.util.PropertyPermission \"java.assistive\", \"read\";\n\nAll users of IBMJava2 should upgrade to these updated packages, which\ncontain IBM\u0027s 1.3.1 SR11 Java release, which resolves these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0133",
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www-128.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www-128.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "242595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242595"
},
{
"category": "external",
"summary": "249533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249533"
},
{
"category": "external",
"summary": "250733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250733"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0133.json"
}
],
"title": "Red Hat Security Advisory: IBMJava2 security update",
"tracking": {
"current_release_date": "2025-10-09T12:52:56+00:00",
"generator": {
"date": "2025-10-09T12:52:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0133",
"initial_release_date": "2008-06-24T09:07:00+00:00",
"revision_history": [
{
"date": "2008-06-24T09:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-06-24T05:07:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T12:52:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "IBMJava2-JRE-1:1.3.1-17.src",
"product": {
"name": "IBMJava2-JRE-1:1.3.1-17.src",
"product_id": "IBMJava2-JRE-1:1.3.1-17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-JRE@1.3.1-17?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "IBMJava2-SDK-1:1.3.1-17.src",
"product": {
"name": "IBMJava2-SDK-1:1.3.1-17.src",
"product_id": "IBMJava2-SDK-1:1.3.1-17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-SDK@1.3.1-17?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "IBMJava2-JRE-1:1.3.1-17.i386",
"product": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386",
"product_id": "IBMJava2-JRE-1:1.3.1-17.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-JRE@1.3.1-17?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "IBMJava2-SDK-1:1.3.1-17.i386",
"product": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386",
"product_id": "IBMJava2-SDK-1:1.3.1-17.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-SDK@1.3.1-17?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-JRE-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-JRE-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-SDK-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-SDK-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-JRE-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-JRE-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-SDK-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-SDK-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-JRE-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-JRE-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-SDK-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.src",
"relates_to_product_reference": "2.1WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3004",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "242595"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2007-2788. Note: All CVE users should reference CVE-2007-2788 instead of this candidate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "IBM JDK: Integer overflow in IBM JDK\u0027s ICC profile parser",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3004"
},
{
"category": "external",
"summary": "RHBZ#242595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3004"
}
],
"release_date": "2007-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-24T09:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "IBM JDK: Integer overflow in IBM JDK\u0027s ICC profile parser"
},
{
"cve": "CVE-2007-3005",
"discovery_date": "2007-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250733"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2007-2789. Note: All CVE users should reference CVE-2007-2789 instead of this candidate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SUN JRE: Unspecified vulnerability in Sun JRE",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3005"
},
{
"category": "external",
"summary": "RHBZ#250733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3005"
}
],
"release_date": "2007-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-24T09:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "SUN JRE: Unspecified vulnerability in Sun JRE"
},
{
"cve": "CVE-2007-3922",
"discovery_date": "2007-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "249533"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) Applet Class Loader in Sun JDK and JRE 5.0 Update 11 and earlier, 6 through 6 Update 1, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to violate the security model for an applet\u0027s outbound connections by connecting to certain localhost services running on the machine that loaded the applet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3922"
},
{
"category": "external",
"summary": "RHBZ#249533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3922",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3922"
}
],
"release_date": "2007-07-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-24T09:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions"
}
]
}
RHSA-2008:0133
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "IBMJava2-JRE and IBMJava2-SDK packages that correct several security issues\nare available for Red Hat Enterprise Linux 2.1.",
"title": "Topic"
},
{
"category": "general",
"text": "IBM\u0027s 1.3.1 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nA buffer overflow was found in the Java Runtime Environment image-handling\ncode. An untrusted applet or application could use this flaw to elevate its\nprivileges and potentially execute arbitrary code as the user running the\njava virtual machine. (CVE-2007-3004)\n\nAn unspecified vulnerability was discovered in the Java Runtime\nEnvironment. An untrusted applet or application could cause the java\nvirtual machine to become unresponsive. (CVE-2007-3005)\n\nA flaw was found in the applet class loader. An untrusted applet could use\nthis flaw to circumvent network access restrictions, possibly connecting to\nservices hosted on the machine that executed the applet. (CVE-2007-3922)\n\nThese updated packages also add the following enhancements:\n\n* Time zone information has been updated to the latest available\ninformation, 2007h.\n\n* Accessibility support in AWT can now be disabled through a system\nproperty, java.assistive. To support this change, permission to read this\nproperty must be added to /opt/IBMJava2-131/jre/lib/security/java.policy.\nUsers of IBMJava2 who have modified this file should add this following\nline to the grant section:\n\npermission java.util.PropertyPermission \"java.assistive\", \"read\";\n\nAll users of IBMJava2 should upgrade to these updated packages, which\ncontain IBM\u0027s 1.3.1 SR11 Java release, which resolves these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0133",
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www-128.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www-128.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "242595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242595"
},
{
"category": "external",
"summary": "249533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249533"
},
{
"category": "external",
"summary": "250733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250733"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0133.json"
}
],
"title": "Red Hat Security Advisory: IBMJava2 security update",
"tracking": {
"current_release_date": "2025-10-09T12:52:56+00:00",
"generator": {
"date": "2025-10-09T12:52:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0133",
"initial_release_date": "2008-06-24T09:07:00+00:00",
"revision_history": [
{
"date": "2008-06-24T09:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-06-24T05:07:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T12:52:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "IBMJava2-JRE-1:1.3.1-17.src",
"product": {
"name": "IBMJava2-JRE-1:1.3.1-17.src",
"product_id": "IBMJava2-JRE-1:1.3.1-17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-JRE@1.3.1-17?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "IBMJava2-SDK-1:1.3.1-17.src",
"product": {
"name": "IBMJava2-SDK-1:1.3.1-17.src",
"product_id": "IBMJava2-SDK-1:1.3.1-17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-SDK@1.3.1-17?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "IBMJava2-JRE-1:1.3.1-17.i386",
"product": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386",
"product_id": "IBMJava2-JRE-1:1.3.1-17.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-JRE@1.3.1-17?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "IBMJava2-SDK-1:1.3.1-17.i386",
"product": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386",
"product_id": "IBMJava2-SDK-1:1.3.1-17.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-SDK@1.3.1-17?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-JRE-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-JRE-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-SDK-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-SDK-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-JRE-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-JRE-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-SDK-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-SDK-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-JRE-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-JRE-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-SDK-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.src",
"relates_to_product_reference": "2.1WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3004",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "242595"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2007-2788. Note: All CVE users should reference CVE-2007-2788 instead of this candidate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "IBM JDK: Integer overflow in IBM JDK\u0027s ICC profile parser",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3004"
},
{
"category": "external",
"summary": "RHBZ#242595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3004"
}
],
"release_date": "2007-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-24T09:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "IBM JDK: Integer overflow in IBM JDK\u0027s ICC profile parser"
},
{
"cve": "CVE-2007-3005",
"discovery_date": "2007-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250733"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2007-2789. Note: All CVE users should reference CVE-2007-2789 instead of this candidate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SUN JRE: Unspecified vulnerability in Sun JRE",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3005"
},
{
"category": "external",
"summary": "RHBZ#250733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3005"
}
],
"release_date": "2007-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-24T09:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "SUN JRE: Unspecified vulnerability in Sun JRE"
},
{
"cve": "CVE-2007-3922",
"discovery_date": "2007-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "249533"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) Applet Class Loader in Sun JDK and JRE 5.0 Update 11 and earlier, 6 through 6 Update 1, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to violate the security model for an applet\u0027s outbound connections by connecting to certain localhost services running on the machine that loaded the applet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3922"
},
{
"category": "external",
"summary": "RHBZ#249533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3922",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3922"
}
],
"release_date": "2007-07-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-24T09:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions"
}
]
}
rhsa-2008_0133
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "IBMJava2-JRE and IBMJava2-SDK packages that correct several security issues\nare available for Red Hat Enterprise Linux 2.1.",
"title": "Topic"
},
{
"category": "general",
"text": "IBM\u0027s 1.3.1 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nA buffer overflow was found in the Java Runtime Environment image-handling\ncode. An untrusted applet or application could use this flaw to elevate its\nprivileges and potentially execute arbitrary code as the user running the\njava virtual machine. (CVE-2007-3004)\n\nAn unspecified vulnerability was discovered in the Java Runtime\nEnvironment. An untrusted applet or application could cause the java\nvirtual machine to become unresponsive. (CVE-2007-3005)\n\nA flaw was found in the applet class loader. An untrusted applet could use\nthis flaw to circumvent network access restrictions, possibly connecting to\nservices hosted on the machine that executed the applet. (CVE-2007-3922)\n\nThese updated packages also add the following enhancements:\n\n* Time zone information has been updated to the latest available\ninformation, 2007h.\n\n* Accessibility support in AWT can now be disabled through a system\nproperty, java.assistive. To support this change, permission to read this\nproperty must be added to /opt/IBMJava2-131/jre/lib/security/java.policy.\nUsers of IBMJava2 who have modified this file should add this following\nline to the grant section:\n\npermission java.util.PropertyPermission \"java.assistive\", \"read\";\n\nAll users of IBMJava2 should upgrade to these updated packages, which\ncontain IBM\u0027s 1.3.1 SR11 Java release, which resolves these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0133",
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www-128.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www-128.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "242595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242595"
},
{
"category": "external",
"summary": "249533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249533"
},
{
"category": "external",
"summary": "250733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250733"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0133.json"
}
],
"title": "Red Hat Security Advisory: IBMJava2 security update",
"tracking": {
"current_release_date": "2024-11-26T13:35:52+00:00",
"generator": {
"date": "2024-11-26T13:35:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0133",
"initial_release_date": "2008-06-24T09:07:00+00:00",
"revision_history": [
{
"date": "2008-06-24T09:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-06-24T05:07:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-26T13:35:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "IBMJava2-JRE-1:1.3.1-17.src",
"product": {
"name": "IBMJava2-JRE-1:1.3.1-17.src",
"product_id": "IBMJava2-JRE-1:1.3.1-17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-JRE@1.3.1-17?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "IBMJava2-SDK-1:1.3.1-17.src",
"product": {
"name": "IBMJava2-SDK-1:1.3.1-17.src",
"product_id": "IBMJava2-SDK-1:1.3.1-17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-SDK@1.3.1-17?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "IBMJava2-JRE-1:1.3.1-17.i386",
"product": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386",
"product_id": "IBMJava2-JRE-1:1.3.1-17.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-JRE@1.3.1-17?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "IBMJava2-SDK-1:1.3.1-17.i386",
"product": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386",
"product_id": "IBMJava2-SDK-1:1.3.1-17.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/IBMJava2-SDK@1.3.1-17?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-JRE-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-JRE-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-SDK-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:IBMJava2-SDK-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-JRE-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-JRE-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-SDK-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:IBMJava2-SDK-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-JRE-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-JRE-1:1.3.1-17.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-JRE-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-JRE-1:1.3.1-17.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-SDK-1:1.3.1-17.i386"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "IBMJava2-SDK-1:1.3.1-17.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
},
"product_reference": "IBMJava2-SDK-1:1.3.1-17.src",
"relates_to_product_reference": "2.1WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3004",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "242595"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2007-2788. Note: All CVE users should reference CVE-2007-2788 instead of this candidate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "IBM JDK: Integer overflow in IBM JDK\u0027s ICC profile parser",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3004"
},
{
"category": "external",
"summary": "RHBZ#242595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3004"
}
],
"release_date": "2007-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-24T09:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "IBM JDK: Integer overflow in IBM JDK\u0027s ICC profile parser"
},
{
"cve": "CVE-2007-3005",
"discovery_date": "2007-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250733"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2007-2789. Note: All CVE users should reference CVE-2007-2789 instead of this candidate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SUN JRE: Unspecified vulnerability in Sun JRE",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3005"
},
{
"category": "external",
"summary": "RHBZ#250733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3005"
}
],
"release_date": "2007-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-24T09:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "SUN JRE: Unspecified vulnerability in Sun JRE"
},
{
"cve": "CVE-2007-3922",
"discovery_date": "2007-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "249533"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) Applet Class Loader in Sun JDK and JRE 5.0 Update 11 and earlier, 6 through 6 Update 1, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to violate the security model for an applet\u0027s outbound connections by connecting to certain localhost services running on the machine that loaded the applet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3922"
},
{
"category": "external",
"summary": "RHBZ#249533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3922",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3922"
}
],
"release_date": "2007-07-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-24T09:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1AS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1AS:IBMJava2-SDK-1:1.3.1-17.src",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1ES:IBMJava2-JRE-1:1.3.1-17.src",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1ES:IBMJava2-SDK-1:1.3.1-17.src",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.i386",
"2.1WS:IBMJava2-JRE-1:1.3.1-17.src",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.i386",
"2.1WS:IBMJava2-SDK-1:1.3.1-17.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0133"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions"
}
]
}
fkie_cve-2007-3004
Vulnerability from fkie_nvd
| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
],
"id": "CVE-2007-3004",
"lastModified": "2023-11-07T02:00:43.630",
"metrics": {},
"published": "2007-06-04T17:30:00.000",
"references": [],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Rejected",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.