Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-1541 (GCVE-0-2012-1541)
Vulnerability from cvelistv5 – Published: 2013-02-02 00:00 – Updated: 2024-08-06 19:01- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:01:01.408Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "oval:org.mitre.oval:def:19070",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070"
},
{
"name": "oval:org.mitre.oval:def:19499",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499"
},
{
"name": "SSRT101156",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"name": "TA13-032A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html"
},
{
"name": "RHSA-2013:0236",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html"
},
{
"name": "RHSA-2013:1455",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "VU#858729",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/858729"
},
{
"name": "RHSA-2013:0237",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
},
{
"name": "HPSBUX02857",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"name": "HPSBMU02874",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
},
{
"name": "SSRT101103",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"name": "57697",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/57697"
},
{
"name": "20130201 Multiple Vendor WebKit JRE Plugin Module Use-after-Free Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE",
"x_transferred"
],
"url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018"
},
{
"name": "RHSA-2013:1456",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "HPSBUX02864",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"name": "oval:org.mitre.oval:def:16384",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384"
},
{
"name": "SSRT101184",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-02-01T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "oval:org.mitre.oval:def:19070",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070"
},
{
"name": "oval:org.mitre.oval:def:19499",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499"
},
{
"name": "SSRT101156",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"name": "TA13-032A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html"
},
{
"name": "RHSA-2013:0236",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html"
},
{
"name": "RHSA-2013:1455",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "VU#858729",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/858729"
},
{
"name": "RHSA-2013:0237",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
},
{
"name": "HPSBUX02857",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"name": "HPSBMU02874",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
},
{
"name": "SSRT101103",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"name": "57697",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/57697"
},
{
"name": "20130201 Multiple Vendor WebKit JRE Plugin Module Use-after-Free Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE"
],
"url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018"
},
{
"name": "RHSA-2013:1456",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "HPSBUX02864",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"name": "oval:org.mitre.oval:def:16384",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384"
},
{
"name": "SSRT101184",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-1541",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:19070",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070"
},
{
"name": "oval:org.mitre.oval:def:19499",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499"
},
{
"name": "SSRT101156",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"name": "TA13-032A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html"
},
{
"name": "RHSA-2013:0236",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "VU#858729",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/858729"
},
{
"name": "RHSA-2013:0237",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
},
{
"name": "HPSBUX02857",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"name": "HPSBMU02874",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
},
{
"name": "SSRT101103",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"name": "57697",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57697"
},
{
"name": "20130201 Multiple Vendor WebKit JRE Plugin Module Use-after-Free Vulnerability",
"refsource": "IDEFENSE",
"url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018"
},
{
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "HPSBUX02864",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"name": "oval:org.mitre.oval:def:16384",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384"
},
{
"name": "SSRT101184",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-1541",
"datePublished": "2013-02-02T00:00:00.000Z",
"dateReserved": "2012-03-08T00:00:00.000Z",
"dateUpdated": "2024-08-06T19:01:01.408Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2012-1541",
"date": "2026-05-20",
"epss": "0.09545",
"percentile": "0.92949"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C27372B-A091-46D5-AE39-A44BBB1D9EE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4B153FD-E20B-4909-8B10-884E48F5B590\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*\", \"matchCriteriaId\": \"F21933FB-A27C-4AF3-9811-2DE28484A5A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2B20041-EB5D-4FA4-AC7D-C35E7878BCFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*\", \"matchCriteriaId\": \"5831D70B-3854-4CB8-B88D-40F1743DAEE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEB101C9-CA38-4421-BC0C-C1AD47AA2CC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA302DF3-ABBB-4262-B206-4C0F7B5B1E91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9A8EBCB-5E6A-42F0-8D07-F3A3D1C850F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CD8A54E-185B-4D34-82EF-C0C05739EC12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FFC7F0D-1F32-4235-8359-277CE41382DF\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E44FC8AF-F76F-4A8E-8D03-4F8BCA8CB031\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6152036D-6421-4AE4-9223-766FE07B5A44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE8B0935-6637-413D-B896-28E0ED7F2CEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*\", \"matchCriteriaId\": \"30B480BC-0886-4B19-B0A5-57B531077F40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D375CECB-405C-4E18-A7E8-9C5A2F97BD69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*\", \"matchCriteriaId\": \"52EEEA5A-E77C-43CF-A063-9D5C64EA1870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*\", \"matchCriteriaId\": \"003746F6-DEF0-4D0F-AD97-9E335868E301\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF830E0E-0169-4B6A-81FF-2E9FCD7D913B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BAE3670-0938-480A-8472-DFF0B3A0D0BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EC967FF-26A6-4498-BC09-EC23B2B75CBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*\", \"matchCriteriaId\": \"02781457-4E40-46A9-A5F7-945232A8C2B1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF13B96D-1F80-4672-8DA3-F86F6D3BF070\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1A2D440-D966-41A6-955D-38B28DDE0FDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1C57774-AD93-4162-8E45-92B09139C808\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD7C4194-D34A-418F-9B00-5C6012844AAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0B82FB1-0F0E-44F9-87AE-628517279E4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D60D98D-4363-44A0-AAB4-B61BA623EE21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*\", \"matchCriteriaId\": \"23CDA4F0-C32B-4B08-A377-7D4426C2F569\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E76476E-4120-46A9-90A8-A95FE89636CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*\", \"matchCriteriaId\": \"97A84689-0CED-404F-8DC3-708BEB37D2CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*\", \"matchCriteriaId\": \"738EC3E5-A4EB-47FE-9C9A-7C8E8C669765\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF56E0D9-612D-4215-9C76-560AE0661A05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA717604-4BB0-4968-B258-7C9F884016FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA71FCF4-580F-432D-AADC-65A2A92CEBC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBCD143C-057D-4F42-B487-46801E14ACF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"09027C19-D442-446F-B7A8-21DB6787CF43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A0FEC28-0707-4F42-9740-78F3D2D551EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3C5879A-A608-4230-9DC1-C27F0F48A13B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A3B254-8580-45DB-BDE4-5B5A29CBFFB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*\", \"matchCriteriaId\": \"AADBB4F9-E43E-428B-9979-F47A15696C85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*\", \"matchCriteriaId\": \"49260B94-05DE-4B78-9068-6F5F6BFDD19E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4FDE9EB-08FE-436E-A265-30E83B15DB23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7158D2C0-E9AC-4CD6-B777-EA7B7A181997\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*\", \"matchCriteriaId\": \"B08C075B-9FC0-4381-A9E4-FFF0362BD308\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*\", \"matchCriteriaId\": \"F587E635-3A15-4186-B6A1-F99BE0A56820\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"90EC6C13-4B37-48E5-8199-A702A944D5A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"2528152C-E20A-4D97-931C-A5EC3CEAA06D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"A99DAB4C-272B-4C91-BC70-7729E1152590\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"30DFC10A-A4D9-4F89-B17C-AB9260087D29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"272A5C44-18EC-41A9-8233-E9D4D0734EA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*\", \"matchCriteriaId\": \"81C2C04D-D4BA-4C87-9609-C53AA63BFF19\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*\", \"matchCriteriaId\": \"301E96A3-AD2F-48F3-9166-571BD6F9FAE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C9215D9-DB64-4CEE-85E6-E247035EFB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*\", \"matchCriteriaId\": \"352509FE-54D9-4A59-98B7-96E5E98BC2CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3EC13D3-4CE7-459C-A7D7-7D38C1284720\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CDCD1B4-C5F3-4188-B05F-23922F7DE517\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*\", \"matchCriteriaId\": \"1824DA2D-26D5-4595-8376-8E41AB8C5E52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*\", \"matchCriteriaId\": \"B72F78B7-10D1-49CF-AC4D-3B10921CB633\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*\", \"matchCriteriaId\": \"60D05860-9424-4727-B583-74A35BC9BDFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*\", \"matchCriteriaId\": \"F85DB431-FEA4-42E7-AC29-6B66174DCD9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB7E911C-C780-440A-ABFF-CCE09061BB4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*\", \"matchCriteriaId\": \"0381EE39-2F60-49FD-A63A-B9E81C9033CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*\", \"matchCriteriaId\": \"9AD75455-B7F0-4F42-98E7-CAA43787D606\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BF0FD06-3953-49AB-A9AA-ACB6883E2D2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*\", \"matchCriteriaId\": \"62823E8E-99CF-40DB-B43E-CBA4E9A2F916\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEA04B0D-D4E3-497D-9564-046B1CDA2342\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3A4FEC7-A4A0-4B5C-A56C-8F80AE19865E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"722A93D8-B5BC-42F3-92A2-E424F61269A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*\", \"matchCriteriaId\": \"775F2611-F11C-4B84-8F40-0D034B81BF18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*\", \"matchCriteriaId\": \"F20FDD9F-FF45-48BC-9207-54FB02E76071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FA326F5-894A-4B01-BCA3-B126DA81CA59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*\", \"matchCriteriaId\": \"228AB7B4-4BA4-43D4-B562-D438884DB152\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFD5C688-2103-4D60-979E-D9BE69A989C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*\", \"matchCriteriaId\": \"21421215-F722-4207-A2E5-E2DF4B29859B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFB9EA23-0EF7-4582-A265-3F5AA9EC81B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*\", \"matchCriteriaId\": \"C367B418-659E-4627-B1F1-1B1216C99055\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD5E6D4E-DDDD-4B45-B5E9-F8A916287AF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*\", \"matchCriteriaId\": \"7358492A-491C-491E-AEDF-63CB82619BAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3DACAAF-AFDC-4391-9E85-344F30937F76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D98175BF-B084-4FA5-899D-9E80DC3923EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"820632CE-F8DF-47EE-B716-7530E60008B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA2BD0A3-7B2D-447B-ABAC-7B867B03B632\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"D54AB785-E9B7-47BD-B756-0C3A629D67DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9412098-0353-4F7B-9245-010557E6C651\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD30DAEB-4893-41CF-A455-B69C463B9337\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*\", \"matchCriteriaId\": \"21D6CE7E-A036-496C-8E08-A87F62B5290A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad no especificada en el componente Java Runtime Environment (JRE) en Oracle Java SE v7 hasta Update 11 y v6 hasta Update 38 permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad mediante vectores relacionados con Deployment, una vulnerabilidad diferente a otros CVEs listados en el February 2013 CPU.\"}]",
"evaluatorComment": "Per http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\r\n\r\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)\"",
"id": "CVE-2012-1541",
"lastModified": "2024-11-21T01:37:11.907",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2013-02-02T00:55:01.083",
"references": "[{\"url\": \"http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0236.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0237.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1455.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1456.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/858729\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/57697\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA13-032A.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0236.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0237.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1455.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1456.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/858729\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/57697\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA13-032A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2012-1541\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-02-02T00:55:01.083\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en el componente Java Runtime Environment (JRE) en Oracle Java SE v7 hasta Update 11 y v6 hasta Update 38 permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad mediante vectores relacionados con Deployment, una vulnerabilidad diferente a otros CVEs listados en el February 2013 CPU.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C27372B-A091-46D5-AE39-A44BBB1D9EE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4B153FD-E20B-4909-8B10-884E48F5B590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"F21933FB-A27C-4AF3-9811-2DE28484A5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2B20041-EB5D-4FA4-AC7D-C35E7878BCFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5831D70B-3854-4CB8-B88D-40F1743DAEE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB101C9-CA38-4421-BC0C-C1AD47AA2CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA302DF3-ABBB-4262-B206-4C0F7B5B1E91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A8EBCB-5E6A-42F0-8D07-F3A3D1C850F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD8A54E-185B-4D34-82EF-C0C05739EC12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FFC7F0D-1F32-4235-8359-277CE41382DF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E44FC8AF-F76F-4A8E-8D03-4F8BCA8CB031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6152036D-6421-4AE4-9223-766FE07B5A44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE8B0935-6637-413D-B896-28E0ED7F2CEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B480BC-0886-4B19-B0A5-57B531077F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D375CECB-405C-4E18-A7E8-9C5A2F97BD69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"52EEEA5A-E77C-43CF-A063-9D5C64EA1870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"003746F6-DEF0-4D0F-AD97-9E335868E301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF830E0E-0169-4B6A-81FF-2E9FCD7D913B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BAE3670-0938-480A-8472-DFF0B3A0D0BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EC967FF-26A6-4498-BC09-EC23B2B75CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"02781457-4E40-46A9-A5F7-945232A8C2B1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF13B96D-1F80-4672-8DA3-F86F6D3BF070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A2D440-D966-41A6-955D-38B28DDE0FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C57774-AD93-4162-8E45-92B09139C808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7C4194-D34A-418F-9B00-5C6012844AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B82FB1-0F0E-44F9-87AE-628517279E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D60D98D-4363-44A0-AAB4-B61BA623EE21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CDA4F0-C32B-4B08-A377-7D4426C2F569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E76476E-4120-46A9-90A8-A95FE89636CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A84689-0CED-404F-8DC3-708BEB37D2CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*\",\"matchCriteriaId\":\"738EC3E5-A4EB-47FE-9C9A-7C8E8C669765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF56E0D9-612D-4215-9C76-560AE0661A05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA717604-4BB0-4968-B258-7C9F884016FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA71FCF4-580F-432D-AADC-65A2A92CEBC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBCD143C-057D-4F42-B487-46801E14ACF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"09027C19-D442-446F-B7A8-21DB6787CF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0FEC28-0707-4F42-9740-78F3D2D551EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3C5879A-A608-4230-9DC1-C27F0F48A13B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3B254-8580-45DB-BDE4-5B5A29CBFFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"AADBB4F9-E43E-428B-9979-F47A15696C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"49260B94-05DE-4B78-9068-6F5F6BFDD19E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FDE9EB-08FE-436E-A265-30E83B15DB23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7158D2C0-E9AC-4CD6-B777-EA7B7A181997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08C075B-9FC0-4381-A9E4-FFF0362BD308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"F587E635-3A15-4186-B6A1-F99BE0A56820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"90EC6C13-4B37-48E5-8199-A702A944D5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2528152C-E20A-4D97-931C-A5EC3CEAA06D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A99DAB4C-272B-4C91-BC70-7729E1152590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DFC10A-A4D9-4F89-B17C-AB9260087D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"272A5C44-18EC-41A9-8233-E9D4D0734EA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C2C04D-D4BA-4C87-9609-C53AA63BFF19\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"301E96A3-AD2F-48F3-9166-571BD6F9FAE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9215D9-DB64-4CEE-85E6-E247035EFB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"352509FE-54D9-4A59-98B7-96E5E98BC2CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3EC13D3-4CE7-459C-A7D7-7D38C1284720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CDCD1B4-C5F3-4188-B05F-23922F7DE517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*\",\"matchCriteriaId\":\"1824DA2D-26D5-4595-8376-8E41AB8C5E52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*\",\"matchCriteriaId\":\"B72F78B7-10D1-49CF-AC4D-3B10921CB633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*\",\"matchCriteriaId\":\"60D05860-9424-4727-B583-74A35BC9BDFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"F85DB431-FEA4-42E7-AC29-6B66174DCD9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB7E911C-C780-440A-ABFF-CCE09061BB4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*\",\"matchCriteriaId\":\"0381EE39-2F60-49FD-A63A-B9E81C9033CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AD75455-B7F0-4F42-98E7-CAA43787D606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF0FD06-3953-49AB-A9AA-ACB6883E2D2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*\",\"matchCriteriaId\":\"62823E8E-99CF-40DB-B43E-CBA4E9A2F916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA04B0D-D4E3-497D-9564-046B1CDA2342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A4FEC7-A4A0-4B5C-A56C-8F80AE19865E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"722A93D8-B5BC-42F3-92A2-E424F61269A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"775F2611-F11C-4B84-8F40-0D034B81BF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"F20FDD9F-FF45-48BC-9207-54FB02E76071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA326F5-894A-4B01-BCA3-B126DA81CA59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"228AB7B4-4BA4-43D4-B562-D438884DB152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD5C688-2103-4D60-979E-D9BE69A989C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"21421215-F722-4207-A2E5-E2DF4B29859B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB9EA23-0EF7-4582-A265-3F5AA9EC81B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C367B418-659E-4627-B1F1-1B1216C99055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD5E6D4E-DDDD-4B45-B5E9-F8A916287AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"7358492A-491C-491E-AEDF-63CB82619BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DACAAF-AFDC-4391-9E85-344F30937F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D98175BF-B084-4FA5-899D-9E80DC3923EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"820632CE-F8DF-47EE-B716-7530E60008B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA2BD0A3-7B2D-447B-ABAC-7B867B03B632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D54AB785-E9B7-47BD-B756-0C3A629D67DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9412098-0353-4F7B-9245-010557E6C651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD30DAEB-4893-41CF-A455-B69C463B9337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*\",\"matchCriteriaId\":\"21D6CE7E-A036-496C-8E08-A87F62B5290A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0236.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0237.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1455.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1456.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/858729\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/57697\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA13-032A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0236.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0237.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1455.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1456.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/858729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/57697\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA13-032A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"Per http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\\r\\n\\r\\n\\\"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)\\\"\"}}"
}
}
CERTA-2013-AVI-092
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Oracle Java. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Java JRE et JDK versions ant\u00e9rieures \u00e0 1.7.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java JRE et JDK versions ant\u00e9rieures \u00e0 1.6.39",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-0431",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0431"
},
{
"name": "CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"name": "CVE-2013-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1489"
},
{
"name": "CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"name": "CVE-2013-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0448"
},
{
"name": "CVE-2012-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3213"
},
{
"name": "CVE-2013-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0446"
},
{
"name": "CVE-2013-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1473"
},
{
"name": "CVE-2013-1475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1475"
},
{
"name": "CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"name": "CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"name": "CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"name": "CVE-2012-3342",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3342"
},
{
"name": "CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"name": "CVE-2013-1479",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1479"
},
{
"name": "CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"name": "CVE-2013-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0429"
},
{
"name": "CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"name": "CVE-2013-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0438"
},
{
"name": "CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"name": "CVE-2013-0449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0449"
},
{
"name": "CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"name": "CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"name": "CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"name": "CVE-2013-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0444"
},
{
"name": "CVE-2013-0430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0430"
},
{
"name": "CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"name": "CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"name": "CVE-2013-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0423"
},
{
"name": "CVE-2013-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0419"
},
{
"name": "CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"name": "CVE-2013-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0351"
},
{
"name": "CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"name": "CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"name": "CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"name": "CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"name": "CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"name": "CVE-2013-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0437"
},
{
"name": "CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
}
],
"links": [],
"reference": "CERTA-2013-AVI-092",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-02-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Java\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 01 f\u00e9vrier 2013",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
]
}
CERTA-2013-AVI-151
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Hitachi Cosminexus. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Hitachi Cosminexus version 6",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 8",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 5",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 9",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 7",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 4",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 6.7",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"name": "CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"name": "CVE-2013-1475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1475"
},
{
"name": "CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"name": "CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"name": "CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"name": "CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"name": "CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2013-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0429"
},
{
"name": "CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"name": "CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"name": "CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"name": "CVE-2013-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1486"
},
{
"name": "CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"name": "CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"name": "CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"name": "CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"name": "CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"name": "CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"name": "CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"name": "CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"name": "CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"name": "CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"name": "CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
}
],
"links": [],
"reference": "CERTA-2013-AVI-151",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHitachi Cosminexus\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Hitachi Cosminexus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Hitachi HS13-004 du 22 f\u00e9vrier 2013",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-004/index.html"
}
]
}
CERTFR-2017-AVI-228
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans SCADA Schneider Electric Trio TView. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Trio TView Software, TBUMPROG-TVIEW versions 3.27.0 et antérieures
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eTrio TView Software, TBUMPROG-TVIEW versions 3.27.0 et ant\u00e9rieures\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-4681",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4681"
},
{
"name": "CVE-2012-5081",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5081"
},
{
"name": "CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"name": "CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"name": "CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"name": "CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"name": "CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"name": "CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"name": "CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"name": "CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"name": "CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"name": "CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"name": "CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"name": "CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"name": "CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"name": "CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"name": "CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"name": "CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"name": "CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"name": "CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"name": "CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"name": "CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"name": "CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"name": "CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"name": "CVE-2012-0504",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0504"
},
{
"name": "CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"name": "CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"name": "CVE-2012-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0500"
},
{
"name": "CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"name": "CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"name": "CVE-2012-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0497"
},
{
"name": "CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"name": "CVE-2012-0551",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0551"
},
{
"name": "CVE-2012-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1721"
},
{
"name": "CVE-2012-1716",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1716"
},
{
"name": "CVE-2012-1717",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1717"
},
{
"name": "CVE-2012-1724",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1724"
},
{
"name": "CVE-2012-1718",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1718"
},
{
"name": "CVE-2012-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1725"
},
{
"name": "CVE-2012-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1720"
},
{
"name": "CVE-2012-1723",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1723"
},
{
"name": "CVE-2012-1713",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1713"
},
{
"name": "CVE-2012-1711",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1711"
},
{
"name": "CVE-2012-1719",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1719"
},
{
"name": "CVE-2012-1722",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1722"
},
{
"name": "CVE-2012-5071",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5071"
},
{
"name": "CVE-2012-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5077"
},
{
"name": "CVE-2012-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5072"
},
{
"name": "CVE-2012-5073",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5073"
},
{
"name": "CVE-2012-5083",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5083"
},
{
"name": "CVE-2012-5085",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5085"
},
{
"name": "CVE-2012-5086",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5086"
},
{
"name": "CVE-2012-1533",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1533"
},
{
"name": "CVE-2012-1531",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1531"
},
{
"name": "CVE-2012-3159",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3159"
},
{
"name": "CVE-2012-4416",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4416"
},
{
"name": "CVE-2012-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3143"
},
{
"name": "CVE-2012-5069",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5069"
},
{
"name": "CVE-2012-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5068"
},
{
"name": "CVE-2012-5084",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5084"
},
{
"name": "CVE-2012-1532",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1532"
},
{
"name": "CVE-2012-5089",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5089"
},
{
"name": "CVE-2012-5079",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5079"
},
{
"name": "CVE-2012-3216",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3216"
},
{
"name": "CVE-2012-5075",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5075"
},
{
"name": "CVE-2013-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0423"
},
{
"name": "CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"name": "CVE-2012-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3213"
},
{
"name": "CVE-2012-3342",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3342"
},
{
"name": "CVE-2013-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0351"
},
{
"name": "CVE-2013-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0429"
},
{
"name": "CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"name": "CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"name": "CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"name": "CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"name": "CVE-2013-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0446"
},
{
"name": "CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"name": "CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"name": "CVE-2013-1475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1475"
},
{
"name": "CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"name": "CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"name": "CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"name": "CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"name": "CVE-2013-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1473"
},
{
"name": "CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"name": "CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"name": "CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"name": "CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"name": "CVE-2013-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0419"
},
{
"name": "CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"name": "CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"name": "CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
},
{
"name": "CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"name": "CVE-2013-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0438"
},
{
"name": "CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"name": "CVE-2013-0430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0430"
},
{
"name": "CVE-2013-1479",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1479"
},
{
"name": "CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"name": "CVE-2013-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1486"
},
{
"name": "CVE-2013-1487",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1487"
},
{
"name": "CVE-2013-0809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0809"
},
{
"name": "CVE-2013-1493",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1493"
},
{
"name": "CVE-2013-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2417"
},
{
"name": "CVE-2013-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2432"
},
{
"name": "CVE-2013-1537",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1537"
},
{
"name": "CVE-2013-1518",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1518"
},
{
"name": "CVE-2013-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1558"
},
{
"name": "CVE-2013-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2430"
},
{
"name": "CVE-2013-2439",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2439"
},
{
"name": "CVE-2013-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2440"
},
{
"name": "CVE-2013-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1563"
},
{
"name": "CVE-2013-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2420"
},
{
"name": "CVE-2013-1557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1557"
},
{
"name": "CVE-2013-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2384"
},
{
"name": "CVE-2013-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2394"
},
{
"name": "CVE-2013-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2418"
},
{
"name": "CVE-2013-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2419"
},
{
"name": "CVE-2013-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1569"
},
{
"name": "CVE-2013-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2429"
},
{
"name": "CVE-2013-1540",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1540"
},
{
"name": "CVE-2013-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2435"
},
{
"name": "CVE-2013-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2424"
},
{
"name": "CVE-2013-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2422"
},
{
"name": "CVE-2013-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2383"
},
{
"name": "CVE-2013-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2433"
},
{
"name": "CVE-2013-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2437"
},
{
"name": "CVE-2013-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2448"
},
{
"name": "CVE-2013-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2461"
},
{
"name": "CVE-2013-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2469"
},
{
"name": "CVE-2013-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2442"
},
{
"name": "CVE-2013-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2407"
},
{
"name": "CVE-2013-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2447"
},
{
"name": "CVE-2013-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2445"
},
{
"name": "CVE-2013-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2454"
},
{
"name": "CVE-2013-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2463"
},
{
"name": "CVE-2013-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2472"
},
{
"name": "CVE-2013-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2444"
},
{
"name": "CVE-2013-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2464"
},
{
"name": "CVE-2013-1571",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1571"
},
{
"name": "CVE-2013-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2466"
},
{
"name": "CVE-2013-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2457"
},
{
"name": "CVE-2013-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2471"
},
{
"name": "CVE-2013-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3743"
},
{
"name": "CVE-2013-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2412"
},
{
"name": "CVE-2013-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2446"
},
{
"name": "CVE-2013-1500",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1500"
},
{
"name": "CVE-2013-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2456"
},
{
"name": "CVE-2013-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2453"
},
{
"name": "CVE-2013-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2443"
},
{
"name": "CVE-2013-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2473"
},
{
"name": "CVE-2013-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2465"
},
{
"name": "CVE-2013-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2468"
},
{
"name": "CVE-2013-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2452"
},
{
"name": "CVE-2013-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2459"
},
{
"name": "CVE-2013-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2455"
},
{
"name": "CVE-2013-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2470"
},
{
"name": "CVE-2013-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2450"
},
{
"name": "CVE-2013-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2451"
},
{
"name": "CVE-2013-5801",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5801"
},
{
"name": "CVE-2013-5829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5829"
},
{
"name": "CVE-2013-5819",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5819"
},
{
"name": "CVE-2013-5840",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5840"
},
{
"name": "CVE-2013-5830",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5830"
},
{
"name": "CVE-2013-5774",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5774"
},
{
"name": "CVE-2013-5818",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5818"
},
{
"name": "CVE-2013-5831",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5831"
},
{
"name": "CVE-2013-5772",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5772"
},
{
"name": "CVE-2013-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5814"
},
{
"name": "CVE-2013-5843",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5843"
},
{
"name": "CVE-2013-5809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5809"
},
{
"name": "CVE-2013-5817",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5817"
},
{
"name": "CVE-2013-5824",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5824"
},
{
"name": "CVE-2013-5787",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5787"
},
{
"name": "CVE-2013-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5784"
},
{
"name": "CVE-2013-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5783"
},
{
"name": "CVE-2013-3829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3829"
},
{
"name": "CVE-2013-5790",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5790"
},
{
"name": "CVE-2013-5802",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5802"
},
{
"name": "CVE-2013-5825",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5825"
},
{
"name": "CVE-2013-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5849"
},
{
"name": "CVE-2013-5820",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5820"
},
{
"name": "CVE-2013-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5850"
},
{
"name": "CVE-2013-5842",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5842"
},
{
"name": "CVE-2013-5780",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5780"
},
{
"name": "CVE-2013-5789",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5789"
},
{
"name": "CVE-2013-5852",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5852"
},
{
"name": "CVE-2013-5804",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5804"
},
{
"name": "CVE-2013-5832",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5832"
},
{
"name": "CVE-2013-5776",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5776"
},
{
"name": "CVE-2013-5797",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5797"
},
{
"name": "CVE-2013-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5803"
},
{
"name": "CVE-2013-5778",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5778"
},
{
"name": "CVE-2013-5812",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5812"
},
{
"name": "CVE-2013-5782",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5782"
},
{
"name": "CVE-2013-5823",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5823"
},
{
"name": "CVE-2013-5888",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5888"
},
{
"name": "CVE-2014-0410",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0410"
},
{
"name": "CVE-2014-0422",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0422"
},
{
"name": "CVE-2014-0368",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0368"
},
{
"name": "CVE-2014-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0417"
},
{
"name": "CVE-2014-0373",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0373"
},
{
"name": "CVE-2014-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
},
{
"name": "CVE-2014-0375",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0375"
},
{
"name": "CVE-2013-5907",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5907"
},
{
"name": "CVE-2014-0416",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0416"
},
{
"name": "CVE-2014-0403",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0403"
},
{
"name": "CVE-2013-5887",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5887"
},
{
"name": "CVE-2014-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0411"
},
{
"name": "CVE-2014-0415",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0415"
},
{
"name": "CVE-2014-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0424"
},
{
"name": "CVE-2013-5905",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5905"
},
{
"name": "CVE-2014-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0428"
},
{
"name": "CVE-2013-5898",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5898"
},
{
"name": "CVE-2013-5899",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5899"
},
{
"name": "CVE-2013-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5889"
},
{
"name": "CVE-2013-5906",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5906"
},
{
"name": "CVE-2013-5902",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5902"
},
{
"name": "CVE-2013-5910",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5910"
},
{
"name": "CVE-2013-5884",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5884"
},
{
"name": "CVE-2014-0387",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0387"
},
{
"name": "CVE-2013-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5878"
},
{
"name": "CVE-2014-0418",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0418"
},
{
"name": "CVE-2014-0376",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0376"
},
{
"name": "CVE-2013-5896",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5896"
},
{
"name": "CVE-2014-0457",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0457"
},
{
"name": "CVE-2014-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0452"
},
{
"name": "CVE-2014-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
},
{
"name": "CVE-2014-2423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2423"
},
{
"name": "CVE-2014-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2409"
},
{
"name": "CVE-2014-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2427"
},
{
"name": "CVE-2014-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2412"
},
{
"name": "CVE-2014-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2401"
},
{
"name": "CVE-2014-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0451"
},
{
"name": "CVE-2014-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0458"
},
{
"name": "CVE-2014-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2403"
},
{
"name": "CVE-2014-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2398"
},
{
"name": "CVE-2014-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2420"
},
{
"name": "CVE-2014-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0446"
},
{
"name": "CVE-2014-2421",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2421"
},
{
"name": "CVE-2014-0449",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0449"
},
{
"name": "CVE-2014-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0429"
},
{
"name": "CVE-2014-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0461"
},
{
"name": "CVE-2014-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2414"
},
{
"name": "CVE-2014-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
},
{
"name": "CVE-2014-2428",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2428"
},
{
"name": "CVE-2014-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0107"
},
{
"name": "CVE-2014-4262",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4262"
},
{
"name": "CVE-2014-4227",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4227"
},
{
"name": "CVE-2014-4268",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4268"
},
{
"name": "CVE-2014-4265",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4265"
},
{
"name": "CVE-2014-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4244"
},
{
"name": "CVE-2014-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4219"
},
{
"name": "CVE-2014-4216",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4216"
},
{
"name": "CVE-2014-4218",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4218"
},
{
"name": "CVE-2014-4252",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4252"
},
{
"name": "CVE-2014-4263",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4263"
},
{
"name": "CVE-2014-4209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4209"
},
{
"name": "CVE-2014-6515",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6515"
},
{
"name": "CVE-2014-6512",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6512"
},
{
"name": "CVE-2014-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6531"
},
{
"name": "CVE-2014-6492",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6492"
},
{
"name": "CVE-2014-6511",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6511"
},
{
"name": "CVE-2014-6493",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6493"
},
{
"name": "CVE-2014-6506",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6506"
},
{
"name": "CVE-2014-6466",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6466"
},
{
"name": "CVE-2014-6513",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6513"
},
{
"name": "CVE-2014-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6458"
},
{
"name": "CVE-2014-6503",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6503"
},
{
"name": "CVE-2014-6517",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6517"
},
{
"name": "CVE-2014-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6457"
},
{
"name": "CVE-2014-6504",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6504"
},
{
"name": "CVE-2014-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6558"
},
{
"name": "CVE-2014-6532",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6532"
},
{
"name": "CVE-2014-4288",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4288"
},
{
"name": "CVE-2015-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0407"
},
{
"name": "CVE-2014-6593",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6593"
},
{
"name": "CVE-2015-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0408"
},
{
"name": "CVE-2015-0412",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0412"
},
{
"name": "CVE-2015-0383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0383"
},
{
"name": "CVE-2014-6585",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6585"
},
{
"name": "CVE-2015-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0400"
},
{
"name": "CVE-2015-0403",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0403"
},
{
"name": "CVE-2014-6601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6601"
},
{
"name": "CVE-2015-0410",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0410"
},
{
"name": "CVE-2015-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0395"
},
{
"name": "CVE-2014-6587",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6587"
},
{
"name": "CVE-2014-6591",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6591"
},
{
"name": "CVE-2015-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0406"
},
{
"name": "CVE-2015-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0469"
},
{
"name": "CVE-2015-0488",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0488"
},
{
"name": "CVE-2015-0478",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0478"
},
{
"name": "CVE-2015-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0492"
},
{
"name": "CVE-2015-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0480"
},
{
"name": "CVE-2015-0491",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0491"
},
{
"name": "CVE-2015-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0458"
},
{
"name": "CVE-2015-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0459"
},
{
"name": "CVE-2015-0477",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0477"
},
{
"name": "CVE-2015-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0460"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2015-2637",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2637"
},
{
"name": "CVE-2015-2628",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2628"
},
{
"name": "CVE-2015-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4732"
},
{
"name": "CVE-2015-2638",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2638"
},
{
"name": "CVE-2015-4733",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4733"
},
{
"name": "CVE-2015-4760",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4760"
},
{
"name": "CVE-2015-4748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4748"
},
{
"name": "CVE-2015-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2625"
},
{
"name": "CVE-2015-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2627"
},
{
"name": "CVE-2015-2621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2621"
},
{
"name": "CVE-2015-2590",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2590"
},
{
"name": "CVE-2015-4749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4749"
},
{
"name": "CVE-2015-2601",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2601"
},
{
"name": "CVE-2015-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2664"
},
{
"name": "CVE-2015-2632",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2632"
},
{
"name": "CVE-2015-4731",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4731"
},
{
"name": "CVE-2015-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4806"
},
{
"name": "CVE-2015-4835",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4835"
},
{
"name": "CVE-2015-4872",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4872"
},
{
"name": "CVE-2015-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4734"
},
{
"name": "CVE-2015-4893",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4893"
},
{
"name": "CVE-2015-4903",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4903"
},
{
"name": "CVE-2015-4883",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4883"
},
{
"name": "CVE-2015-4844",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4844"
},
{
"name": "CVE-2015-4842",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4842"
},
{
"name": "CVE-2015-4805",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4805"
},
{
"name": "CVE-2015-4882",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4882"
},
{
"name": "CVE-2015-4843",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4843"
},
{
"name": "CVE-2015-4860",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4860"
},
{
"name": "CVE-2015-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4911"
},
{
"name": "CVE-2015-4902",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4902"
},
{
"name": "CVE-2015-4881",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4881"
},
{
"name": "CVE-2015-4803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4803"
},
{
"name": "CVE-2016-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0466"
},
{
"name": "CVE-2016-0402",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0402"
},
{
"name": "CVE-2016-0483",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0483"
},
{
"name": "CVE-2016-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0448"
},
{
"name": "CVE-2016-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0494"
},
{
"name": "CVE-2016-0603",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0603"
},
{
"name": "CVE-2016-0695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0695"
},
{
"name": "CVE-2016-3427",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3427"
},
{
"name": "CVE-2016-3425",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3425"
},
{
"name": "CVE-2016-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3449"
},
{
"name": "CVE-2016-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0686"
},
{
"name": "CVE-2016-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3443"
},
{
"name": "CVE-2016-3422",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3422"
},
{
"name": "CVE-2016-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0687"
},
{
"name": "CVE-2016-3485",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3485"
},
{
"name": "CVE-2016-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3503"
},
{
"name": "CVE-2016-3458",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3458"
},
{
"name": "CVE-2016-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3500"
},
{
"name": "CVE-2016-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3550"
},
{
"name": "CVE-2016-3508",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3508"
},
{
"name": "CVE-2016-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5568"
},
{
"name": "CVE-2016-5554",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5554"
},
{
"name": "CVE-2016-5542",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5542"
},
{
"name": "CVE-2016-5597",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5597"
},
{
"name": "CVE-2016-5573",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5573"
},
{
"name": "CVE-2016-5556",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5556"
},
{
"name": "CVE-2016-5582",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5582"
},
{
"name": "CVE-2013-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4204"
},
{
"name": "CVE-2012-5920",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5920"
},
{
"name": "CVE-2014-8152",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8152"
},
{
"name": "CVE-2012-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0547"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2017-199-01 du 18 juillet 2017",
"url": "http://www.schneider-electric.com/en/download/document/SEVD-2017-199-01/"
}
],
"reference": "CERTFR-2017-AVI-228",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSCADA Schneider Electric Trio TView\u003c/span\u003e. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans SCADA Schneider Electric Trio TView",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2017-199-01 du 18 juillet 2017",
"url": null
}
]
}
CERTA-2013-AVI-092
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Oracle Java. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Java JRE et JDK versions ant\u00e9rieures \u00e0 1.7.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java JRE et JDK versions ant\u00e9rieures \u00e0 1.6.39",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-0431",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0431"
},
{
"name": "CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"name": "CVE-2013-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1489"
},
{
"name": "CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"name": "CVE-2013-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0448"
},
{
"name": "CVE-2012-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3213"
},
{
"name": "CVE-2013-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0446"
},
{
"name": "CVE-2013-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1473"
},
{
"name": "CVE-2013-1475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1475"
},
{
"name": "CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"name": "CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"name": "CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"name": "CVE-2012-3342",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3342"
},
{
"name": "CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"name": "CVE-2013-1479",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1479"
},
{
"name": "CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"name": "CVE-2013-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0429"
},
{
"name": "CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"name": "CVE-2013-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0438"
},
{
"name": "CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"name": "CVE-2013-0449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0449"
},
{
"name": "CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"name": "CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"name": "CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"name": "CVE-2013-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0444"
},
{
"name": "CVE-2013-0430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0430"
},
{
"name": "CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"name": "CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"name": "CVE-2013-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0423"
},
{
"name": "CVE-2013-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0419"
},
{
"name": "CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"name": "CVE-2013-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0351"
},
{
"name": "CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"name": "CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"name": "CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"name": "CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"name": "CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"name": "CVE-2013-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0437"
},
{
"name": "CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
}
],
"links": [],
"reference": "CERTA-2013-AVI-092",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-02-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Java\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 01 f\u00e9vrier 2013",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
]
}
CERTA-2013-AVI-151
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Hitachi Cosminexus. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Hitachi Cosminexus version 6",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 8",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 5",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 9",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 7",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 4",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Hitachi Cosminexus version 6.7",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"name": "CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"name": "CVE-2013-1475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1475"
},
{
"name": "CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"name": "CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"name": "CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"name": "CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"name": "CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2013-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0429"
},
{
"name": "CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"name": "CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"name": "CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"name": "CVE-2013-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1486"
},
{
"name": "CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"name": "CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"name": "CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"name": "CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"name": "CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"name": "CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"name": "CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"name": "CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"name": "CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"name": "CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"name": "CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
}
],
"links": [],
"reference": "CERTA-2013-AVI-151",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHitachi Cosminexus\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Hitachi Cosminexus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Hitachi HS13-004 du 22 f\u00e9vrier 2013",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-004/index.html"
}
]
}
CERTFR-2017-AVI-228
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans SCADA Schneider Electric Trio TView. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Trio TView Software, TBUMPROG-TVIEW versions 3.27.0 et antérieures
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eTrio TView Software, TBUMPROG-TVIEW versions 3.27.0 et ant\u00e9rieures\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-4681",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4681"
},
{
"name": "CVE-2012-5081",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5081"
},
{
"name": "CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"name": "CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"name": "CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"name": "CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"name": "CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"name": "CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"name": "CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"name": "CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"name": "CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"name": "CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"name": "CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"name": "CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"name": "CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"name": "CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"name": "CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"name": "CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"name": "CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"name": "CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"name": "CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"name": "CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"name": "CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"name": "CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"name": "CVE-2012-0504",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0504"
},
{
"name": "CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"name": "CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"name": "CVE-2012-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0500"
},
{
"name": "CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"name": "CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"name": "CVE-2012-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0497"
},
{
"name": "CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"name": "CVE-2012-0551",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0551"
},
{
"name": "CVE-2012-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1721"
},
{
"name": "CVE-2012-1716",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1716"
},
{
"name": "CVE-2012-1717",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1717"
},
{
"name": "CVE-2012-1724",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1724"
},
{
"name": "CVE-2012-1718",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1718"
},
{
"name": "CVE-2012-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1725"
},
{
"name": "CVE-2012-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1720"
},
{
"name": "CVE-2012-1723",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1723"
},
{
"name": "CVE-2012-1713",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1713"
},
{
"name": "CVE-2012-1711",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1711"
},
{
"name": "CVE-2012-1719",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1719"
},
{
"name": "CVE-2012-1722",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1722"
},
{
"name": "CVE-2012-5071",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5071"
},
{
"name": "CVE-2012-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5077"
},
{
"name": "CVE-2012-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5072"
},
{
"name": "CVE-2012-5073",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5073"
},
{
"name": "CVE-2012-5083",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5083"
},
{
"name": "CVE-2012-5085",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5085"
},
{
"name": "CVE-2012-5086",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5086"
},
{
"name": "CVE-2012-1533",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1533"
},
{
"name": "CVE-2012-1531",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1531"
},
{
"name": "CVE-2012-3159",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3159"
},
{
"name": "CVE-2012-4416",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4416"
},
{
"name": "CVE-2012-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3143"
},
{
"name": "CVE-2012-5069",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5069"
},
{
"name": "CVE-2012-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5068"
},
{
"name": "CVE-2012-5084",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5084"
},
{
"name": "CVE-2012-1532",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1532"
},
{
"name": "CVE-2012-5089",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5089"
},
{
"name": "CVE-2012-5079",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5079"
},
{
"name": "CVE-2012-3216",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3216"
},
{
"name": "CVE-2012-5075",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5075"
},
{
"name": "CVE-2013-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0423"
},
{
"name": "CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"name": "CVE-2012-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3213"
},
{
"name": "CVE-2012-3342",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3342"
},
{
"name": "CVE-2013-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0351"
},
{
"name": "CVE-2013-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0429"
},
{
"name": "CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"name": "CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"name": "CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"name": "CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"name": "CVE-2013-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0446"
},
{
"name": "CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"name": "CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"name": "CVE-2013-1475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1475"
},
{
"name": "CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"name": "CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"name": "CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"name": "CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"name": "CVE-2013-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1473"
},
{
"name": "CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"name": "CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"name": "CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"name": "CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"name": "CVE-2013-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0419"
},
{
"name": "CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"name": "CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"name": "CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
},
{
"name": "CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"name": "CVE-2013-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0438"
},
{
"name": "CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"name": "CVE-2013-0430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0430"
},
{
"name": "CVE-2013-1479",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1479"
},
{
"name": "CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"name": "CVE-2013-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1486"
},
{
"name": "CVE-2013-1487",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1487"
},
{
"name": "CVE-2013-0809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0809"
},
{
"name": "CVE-2013-1493",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1493"
},
{
"name": "CVE-2013-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2417"
},
{
"name": "CVE-2013-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2432"
},
{
"name": "CVE-2013-1537",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1537"
},
{
"name": "CVE-2013-1518",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1518"
},
{
"name": "CVE-2013-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1558"
},
{
"name": "CVE-2013-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2430"
},
{
"name": "CVE-2013-2439",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2439"
},
{
"name": "CVE-2013-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2440"
},
{
"name": "CVE-2013-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1563"
},
{
"name": "CVE-2013-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2420"
},
{
"name": "CVE-2013-1557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1557"
},
{
"name": "CVE-2013-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2384"
},
{
"name": "CVE-2013-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2394"
},
{
"name": "CVE-2013-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2418"
},
{
"name": "CVE-2013-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2419"
},
{
"name": "CVE-2013-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1569"
},
{
"name": "CVE-2013-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2429"
},
{
"name": "CVE-2013-1540",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1540"
},
{
"name": "CVE-2013-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2435"
},
{
"name": "CVE-2013-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2424"
},
{
"name": "CVE-2013-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2422"
},
{
"name": "CVE-2013-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2383"
},
{
"name": "CVE-2013-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2433"
},
{
"name": "CVE-2013-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2437"
},
{
"name": "CVE-2013-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2448"
},
{
"name": "CVE-2013-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2461"
},
{
"name": "CVE-2013-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2469"
},
{
"name": "CVE-2013-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2442"
},
{
"name": "CVE-2013-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2407"
},
{
"name": "CVE-2013-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2447"
},
{
"name": "CVE-2013-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2445"
},
{
"name": "CVE-2013-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2454"
},
{
"name": "CVE-2013-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2463"
},
{
"name": "CVE-2013-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2472"
},
{
"name": "CVE-2013-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2444"
},
{
"name": "CVE-2013-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2464"
},
{
"name": "CVE-2013-1571",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1571"
},
{
"name": "CVE-2013-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2466"
},
{
"name": "CVE-2013-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2457"
},
{
"name": "CVE-2013-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2471"
},
{
"name": "CVE-2013-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3743"
},
{
"name": "CVE-2013-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2412"
},
{
"name": "CVE-2013-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2446"
},
{
"name": "CVE-2013-1500",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1500"
},
{
"name": "CVE-2013-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2456"
},
{
"name": "CVE-2013-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2453"
},
{
"name": "CVE-2013-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2443"
},
{
"name": "CVE-2013-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2473"
},
{
"name": "CVE-2013-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2465"
},
{
"name": "CVE-2013-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2468"
},
{
"name": "CVE-2013-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2452"
},
{
"name": "CVE-2013-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2459"
},
{
"name": "CVE-2013-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2455"
},
{
"name": "CVE-2013-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2470"
},
{
"name": "CVE-2013-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2450"
},
{
"name": "CVE-2013-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2451"
},
{
"name": "CVE-2013-5801",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5801"
},
{
"name": "CVE-2013-5829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5829"
},
{
"name": "CVE-2013-5819",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5819"
},
{
"name": "CVE-2013-5840",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5840"
},
{
"name": "CVE-2013-5830",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5830"
},
{
"name": "CVE-2013-5774",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5774"
},
{
"name": "CVE-2013-5818",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5818"
},
{
"name": "CVE-2013-5831",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5831"
},
{
"name": "CVE-2013-5772",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5772"
},
{
"name": "CVE-2013-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5814"
},
{
"name": "CVE-2013-5843",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5843"
},
{
"name": "CVE-2013-5809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5809"
},
{
"name": "CVE-2013-5817",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5817"
},
{
"name": "CVE-2013-5824",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5824"
},
{
"name": "CVE-2013-5787",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5787"
},
{
"name": "CVE-2013-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5784"
},
{
"name": "CVE-2013-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5783"
},
{
"name": "CVE-2013-3829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3829"
},
{
"name": "CVE-2013-5790",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5790"
},
{
"name": "CVE-2013-5802",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5802"
},
{
"name": "CVE-2013-5825",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5825"
},
{
"name": "CVE-2013-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5849"
},
{
"name": "CVE-2013-5820",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5820"
},
{
"name": "CVE-2013-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5850"
},
{
"name": "CVE-2013-5842",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5842"
},
{
"name": "CVE-2013-5780",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5780"
},
{
"name": "CVE-2013-5789",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5789"
},
{
"name": "CVE-2013-5852",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5852"
},
{
"name": "CVE-2013-5804",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5804"
},
{
"name": "CVE-2013-5832",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5832"
},
{
"name": "CVE-2013-5776",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5776"
},
{
"name": "CVE-2013-5797",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5797"
},
{
"name": "CVE-2013-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5803"
},
{
"name": "CVE-2013-5778",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5778"
},
{
"name": "CVE-2013-5812",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5812"
},
{
"name": "CVE-2013-5782",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5782"
},
{
"name": "CVE-2013-5823",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5823"
},
{
"name": "CVE-2013-5888",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5888"
},
{
"name": "CVE-2014-0410",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0410"
},
{
"name": "CVE-2014-0422",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0422"
},
{
"name": "CVE-2014-0368",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0368"
},
{
"name": "CVE-2014-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0417"
},
{
"name": "CVE-2014-0373",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0373"
},
{
"name": "CVE-2014-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
},
{
"name": "CVE-2014-0375",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0375"
},
{
"name": "CVE-2013-5907",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5907"
},
{
"name": "CVE-2014-0416",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0416"
},
{
"name": "CVE-2014-0403",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0403"
},
{
"name": "CVE-2013-5887",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5887"
},
{
"name": "CVE-2014-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0411"
},
{
"name": "CVE-2014-0415",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0415"
},
{
"name": "CVE-2014-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0424"
},
{
"name": "CVE-2013-5905",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5905"
},
{
"name": "CVE-2014-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0428"
},
{
"name": "CVE-2013-5898",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5898"
},
{
"name": "CVE-2013-5899",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5899"
},
{
"name": "CVE-2013-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5889"
},
{
"name": "CVE-2013-5906",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5906"
},
{
"name": "CVE-2013-5902",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5902"
},
{
"name": "CVE-2013-5910",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5910"
},
{
"name": "CVE-2013-5884",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5884"
},
{
"name": "CVE-2014-0387",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0387"
},
{
"name": "CVE-2013-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5878"
},
{
"name": "CVE-2014-0418",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0418"
},
{
"name": "CVE-2014-0376",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0376"
},
{
"name": "CVE-2013-5896",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5896"
},
{
"name": "CVE-2014-0457",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0457"
},
{
"name": "CVE-2014-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0452"
},
{
"name": "CVE-2014-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
},
{
"name": "CVE-2014-2423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2423"
},
{
"name": "CVE-2014-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2409"
},
{
"name": "CVE-2014-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2427"
},
{
"name": "CVE-2014-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2412"
},
{
"name": "CVE-2014-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2401"
},
{
"name": "CVE-2014-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0451"
},
{
"name": "CVE-2014-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0458"
},
{
"name": "CVE-2014-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2403"
},
{
"name": "CVE-2014-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2398"
},
{
"name": "CVE-2014-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2420"
},
{
"name": "CVE-2014-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0446"
},
{
"name": "CVE-2014-2421",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2421"
},
{
"name": "CVE-2014-0449",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0449"
},
{
"name": "CVE-2014-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0429"
},
{
"name": "CVE-2014-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0461"
},
{
"name": "CVE-2014-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2414"
},
{
"name": "CVE-2014-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
},
{
"name": "CVE-2014-2428",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2428"
},
{
"name": "CVE-2014-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0107"
},
{
"name": "CVE-2014-4262",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4262"
},
{
"name": "CVE-2014-4227",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4227"
},
{
"name": "CVE-2014-4268",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4268"
},
{
"name": "CVE-2014-4265",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4265"
},
{
"name": "CVE-2014-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4244"
},
{
"name": "CVE-2014-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4219"
},
{
"name": "CVE-2014-4216",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4216"
},
{
"name": "CVE-2014-4218",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4218"
},
{
"name": "CVE-2014-4252",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4252"
},
{
"name": "CVE-2014-4263",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4263"
},
{
"name": "CVE-2014-4209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4209"
},
{
"name": "CVE-2014-6515",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6515"
},
{
"name": "CVE-2014-6512",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6512"
},
{
"name": "CVE-2014-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6531"
},
{
"name": "CVE-2014-6492",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6492"
},
{
"name": "CVE-2014-6511",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6511"
},
{
"name": "CVE-2014-6493",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6493"
},
{
"name": "CVE-2014-6506",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6506"
},
{
"name": "CVE-2014-6466",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6466"
},
{
"name": "CVE-2014-6513",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6513"
},
{
"name": "CVE-2014-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6458"
},
{
"name": "CVE-2014-6503",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6503"
},
{
"name": "CVE-2014-6517",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6517"
},
{
"name": "CVE-2014-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6457"
},
{
"name": "CVE-2014-6504",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6504"
},
{
"name": "CVE-2014-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6558"
},
{
"name": "CVE-2014-6532",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6532"
},
{
"name": "CVE-2014-4288",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4288"
},
{
"name": "CVE-2015-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0407"
},
{
"name": "CVE-2014-6593",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6593"
},
{
"name": "CVE-2015-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0408"
},
{
"name": "CVE-2015-0412",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0412"
},
{
"name": "CVE-2015-0383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0383"
},
{
"name": "CVE-2014-6585",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6585"
},
{
"name": "CVE-2015-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0400"
},
{
"name": "CVE-2015-0403",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0403"
},
{
"name": "CVE-2014-6601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6601"
},
{
"name": "CVE-2015-0410",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0410"
},
{
"name": "CVE-2015-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0395"
},
{
"name": "CVE-2014-6587",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6587"
},
{
"name": "CVE-2014-6591",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6591"
},
{
"name": "CVE-2015-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0406"
},
{
"name": "CVE-2015-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0469"
},
{
"name": "CVE-2015-0488",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0488"
},
{
"name": "CVE-2015-0478",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0478"
},
{
"name": "CVE-2015-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0492"
},
{
"name": "CVE-2015-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0480"
},
{
"name": "CVE-2015-0491",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0491"
},
{
"name": "CVE-2015-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0458"
},
{
"name": "CVE-2015-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0459"
},
{
"name": "CVE-2015-0477",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0477"
},
{
"name": "CVE-2015-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0460"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2015-2637",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2637"
},
{
"name": "CVE-2015-2628",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2628"
},
{
"name": "CVE-2015-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4732"
},
{
"name": "CVE-2015-2638",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2638"
},
{
"name": "CVE-2015-4733",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4733"
},
{
"name": "CVE-2015-4760",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4760"
},
{
"name": "CVE-2015-4748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4748"
},
{
"name": "CVE-2015-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2625"
},
{
"name": "CVE-2015-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2627"
},
{
"name": "CVE-2015-2621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2621"
},
{
"name": "CVE-2015-2590",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2590"
},
{
"name": "CVE-2015-4749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4749"
},
{
"name": "CVE-2015-2601",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2601"
},
{
"name": "CVE-2015-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2664"
},
{
"name": "CVE-2015-2632",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2632"
},
{
"name": "CVE-2015-4731",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4731"
},
{
"name": "CVE-2015-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4806"
},
{
"name": "CVE-2015-4835",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4835"
},
{
"name": "CVE-2015-4872",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4872"
},
{
"name": "CVE-2015-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4734"
},
{
"name": "CVE-2015-4893",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4893"
},
{
"name": "CVE-2015-4903",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4903"
},
{
"name": "CVE-2015-4883",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4883"
},
{
"name": "CVE-2015-4844",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4844"
},
{
"name": "CVE-2015-4842",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4842"
},
{
"name": "CVE-2015-4805",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4805"
},
{
"name": "CVE-2015-4882",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4882"
},
{
"name": "CVE-2015-4843",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4843"
},
{
"name": "CVE-2015-4860",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4860"
},
{
"name": "CVE-2015-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4911"
},
{
"name": "CVE-2015-4902",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4902"
},
{
"name": "CVE-2015-4881",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4881"
},
{
"name": "CVE-2015-4803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4803"
},
{
"name": "CVE-2016-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0466"
},
{
"name": "CVE-2016-0402",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0402"
},
{
"name": "CVE-2016-0483",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0483"
},
{
"name": "CVE-2016-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0448"
},
{
"name": "CVE-2016-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0494"
},
{
"name": "CVE-2016-0603",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0603"
},
{
"name": "CVE-2016-0695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0695"
},
{
"name": "CVE-2016-3427",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3427"
},
{
"name": "CVE-2016-3425",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3425"
},
{
"name": "CVE-2016-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3449"
},
{
"name": "CVE-2016-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0686"
},
{
"name": "CVE-2016-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3443"
},
{
"name": "CVE-2016-3422",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3422"
},
{
"name": "CVE-2016-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0687"
},
{
"name": "CVE-2016-3485",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3485"
},
{
"name": "CVE-2016-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3503"
},
{
"name": "CVE-2016-3458",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3458"
},
{
"name": "CVE-2016-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3500"
},
{
"name": "CVE-2016-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3550"
},
{
"name": "CVE-2016-3508",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3508"
},
{
"name": "CVE-2016-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5568"
},
{
"name": "CVE-2016-5554",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5554"
},
{
"name": "CVE-2016-5542",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5542"
},
{
"name": "CVE-2016-5597",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5597"
},
{
"name": "CVE-2016-5573",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5573"
},
{
"name": "CVE-2016-5556",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5556"
},
{
"name": "CVE-2016-5582",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5582"
},
{
"name": "CVE-2013-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4204"
},
{
"name": "CVE-2012-5920",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5920"
},
{
"name": "CVE-2014-8152",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8152"
},
{
"name": "CVE-2012-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0547"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2017-199-01 du 18 juillet 2017",
"url": "http://www.schneider-electric.com/en/download/document/SEVD-2017-199-01/"
}
],
"reference": "CERTFR-2017-AVI-228",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSCADA Schneider Electric Trio TView\u003c/span\u003e. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans SCADA Schneider Electric Trio TView",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2017-199-01 du 18 juillet 2017",
"url": null
}
]
}
FKIE_CVE-2012-1541
Vulnerability from fkie_nvd - Published: 2013-02-02 00:55 - Updated: 2026-04-29 01:13| Vendor | Product | Version | |
|---|---|---|---|
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| sun | jre | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 | |
| sun | jdk | 1.6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5C27372B-A091-46D5-AE39-A44BBB1D9EE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "F4B153FD-E20B-4909-8B10-884E48F5B590",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"matchCriteriaId": "F21933FB-A27C-4AF3-9811-2DE28484A5A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"matchCriteriaId": "B2B20041-EB5D-4FA4-AC7D-C35E7878BCFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "5831D70B-3854-4CB8-B88D-40F1743DAEE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"matchCriteriaId": "EEB101C9-CA38-4421-BC0C-C1AD47AA2CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"matchCriteriaId": "BA302DF3-ABBB-4262-B206-4C0F7B5B1E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"matchCriteriaId": "F9A8EBCB-5E6A-42F0-8D07-F3A3D1C850F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"matchCriteriaId": "0CD8A54E-185B-4D34-82EF-C0C05739EC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"matchCriteriaId": "4FFC7F0D-1F32-4235-8359-277CE41382DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E44FC8AF-F76F-4A8E-8D03-4F8BCA8CB031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "6152036D-6421-4AE4-9223-766FE07B5A44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"matchCriteriaId": "FE8B0935-6637-413D-B896-28E0ED7F2CEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"matchCriteriaId": "30B480BC-0886-4B19-B0A5-57B531077F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "D375CECB-405C-4E18-A7E8-9C5A2F97BD69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "52EEEA5A-E77C-43CF-A063-9D5C64EA1870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"matchCriteriaId": "003746F6-DEF0-4D0F-AD97-9E335868E301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"matchCriteriaId": "CF830E0E-0169-4B6A-81FF-2E9FCD7D913B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"matchCriteriaId": "6BAE3670-0938-480A-8472-DFF0B3A0D0BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"matchCriteriaId": "0EC967FF-26A6-4498-BC09-EC23B2B75CBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"matchCriteriaId": "02781457-4E40-46A9-A5F7-945232A8C2B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"matchCriteriaId": "EF13B96D-1F80-4672-8DA3-F86F6D3BF070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"matchCriteriaId": "D1A2D440-D966-41A6-955D-38B28DDE0FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"matchCriteriaId": "B1C57774-AD93-4162-8E45-92B09139C808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"matchCriteriaId": "CD7C4194-D34A-418F-9B00-5C6012844AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"matchCriteriaId": "DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"matchCriteriaId": "F0B82FB1-0F0E-44F9-87AE-628517279E4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"matchCriteriaId": "A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"matchCriteriaId": "0D60D98D-4363-44A0-AAB4-B61BA623EE21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"matchCriteriaId": "23CDA4F0-C32B-4B08-A377-7D4426C2F569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"matchCriteriaId": "8E76476E-4120-46A9-90A8-A95FE89636CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
"matchCriteriaId": "97A84689-0CED-404F-8DC3-708BEB37D2CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
"matchCriteriaId": "738EC3E5-A4EB-47FE-9C9A-7C8E8C669765",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*",
"matchCriteriaId": "FF56E0D9-612D-4215-9C76-560AE0661A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*",
"matchCriteriaId": "BA717604-4BB0-4968-B258-7C9F884016FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*",
"matchCriteriaId": "AA71FCF4-580F-432D-AADC-65A2A92CEBC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBCD143C-057D-4F42-B487-46801E14ACF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"matchCriteriaId": "49260B94-05DE-4B78-9068-6F5F6BFDD19E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"matchCriteriaId": "C4FDE9EB-08FE-436E-A265-30E83B15DB23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"matchCriteriaId": "BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"matchCriteriaId": "B08C075B-9FC0-4381-A9E4-FFF0362BD308",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
"matchCriteriaId": "F587E635-3A15-4186-B6A1-F99BE0A56820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*",
"matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"matchCriteriaId": "301E96A3-AD2F-48F3-9166-571BD6F9FAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"matchCriteriaId": "6C9215D9-DB64-4CEE-85E6-E247035EFB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"matchCriteriaId": "352509FE-54D9-4A59-98B7-96E5E98BC2CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"matchCriteriaId": "C3EC13D3-4CE7-459C-A7D7-7D38C1284720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"matchCriteriaId": "8CDCD1B4-C5F3-4188-B05F-23922F7DE517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"matchCriteriaId": "1824DA2D-26D5-4595-8376-8E41AB8C5E52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"matchCriteriaId": "B72F78B7-10D1-49CF-AC4D-3B10921CB633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"matchCriteriaId": "60D05860-9424-4727-B583-74A35BC9BDFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"matchCriteriaId": "F85DB431-FEA4-42E7-AC29-6B66174DCD9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"matchCriteriaId": "FB7E911C-C780-440A-ABFF-CCE09061BB4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"matchCriteriaId": "0381EE39-2F60-49FD-A63A-B9E81C9033CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"matchCriteriaId": "9AD75455-B7F0-4F42-98E7-CAA43787D606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*",
"matchCriteriaId": "3BF0FD06-3953-49AB-A9AA-ACB6883E2D2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*",
"matchCriteriaId": "62823E8E-99CF-40DB-B43E-CBA4E9A2F916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*",
"matchCriteriaId": "FEA04B0D-D4E3-497D-9564-046B1CDA2342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A3A4FEC7-A4A0-4B5C-A56C-8F80AE19865E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"matchCriteriaId": "BFB9EA23-0EF7-4582-A265-3F5AA9EC81B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"matchCriteriaId": "C367B418-659E-4627-B1F1-1B1216C99055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"matchCriteriaId": "CD5E6D4E-DDDD-4B45-B5E9-F8A916287AF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"matchCriteriaId": "7358492A-491C-491E-AEDF-63CB82619BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
"matchCriteriaId": "C3DACAAF-AFDC-4391-9E85-344F30937F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "AD30DAEB-4893-41CF-A455-B69C463B9337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"matchCriteriaId": "21D6CE7E-A036-496C-8E08-A87F62B5290A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el componente Java Runtime Environment (JRE) en Oracle Java SE v7 hasta Update 11 y v6 hasta Update 38 permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad mediante vectores relacionados con Deployment, una vulnerabilidad diferente a otros CVEs listados en el February 2013 CPU."
}
],
"evaluatorComment": "Per http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\r\n\r\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)\"",
"id": "CVE-2012-1541",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-02-02T00:55:01.083",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/858729"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/57697"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/858729"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/57697"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-VCJX-5V7Q-4697
Vulnerability from github – Published: 2022-05-14 00:02 – Updated: 2022-05-14 00:02Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.
{
"affected": [],
"aliases": [
"CVE-2012-1541"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-02-02T00:55:00Z",
"severity": "HIGH"
},
"details": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.",
"id": "GHSA-vcjx-5v7q-4697",
"modified": "2022-05-14T00:02:55Z",
"published": "2022-05-14T00:02:55Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/858729"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/57697"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html"
},
{
"type": "WEB",
"url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2012-1541
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2012-1541",
"description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.",
"id": "GSD-2012-1541",
"references": [
"https://www.suse.com/security/cve/CVE-2012-1541.html",
"https://access.redhat.com/errata/RHSA-2013:1456",
"https://access.redhat.com/errata/RHSA-2013:1455",
"https://access.redhat.com/errata/RHSA-2013:0626",
"https://access.redhat.com/errata/RHSA-2013:0625",
"https://access.redhat.com/errata/RHSA-2013:0237",
"https://access.redhat.com/errata/RHSA-2013:0236"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-1541"
],
"details": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.",
"id": "GSD-2012-1541",
"modified": "2023-12-13T01:20:18.077835Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-1541",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:19070",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070"
},
{
"name": "oval:org.mitre.oval:def:19499",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499"
},
{
"name": "SSRT101156",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"name": "TA13-032A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html"
},
{
"name": "RHSA-2013:0236",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "VU#858729",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/858729"
},
{
"name": "RHSA-2013:0237",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
},
{
"name": "HPSBUX02857",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"name": "HPSBMU02874",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
},
{
"name": "SSRT101103",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"name": "57697",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57697"
},
{
"name": "20130201 Multiple Vendor WebKit JRE Plugin Module Use-after-Free Vulnerability",
"refsource": "IDEFENSE",
"url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018"
},
{
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "HPSBUX02864",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"name": "oval:org.mitre.oval:def:16384",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384"
},
{
"name": "SSRT101184",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-1541"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"name": "RHSA-2013:0237",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
},
{
"name": "RHSA-2013:0236",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html"
},
{
"name": "TA13-032A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html"
},
{
"name": "VU#858729",
"refsource": "CERT-VN",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/858729"
},
{
"name": "HPSBMU02874",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2"
},
{
"name": "HPSBUX02857",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2"
},
{
"name": "SSRT101156",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2"
},
{
"name": "20130201 Multiple Vendor WebKit JRE Plugin Module Use-after-Free Vulnerability",
"refsource": "IDEFENSE",
"tags": [],
"url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "57697",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/57697"
},
{
"name": "oval:org.mitre.oval:def:19499",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19499"
},
{
"name": "oval:org.mitre.oval:def:19070",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19070"
},
{
"name": "oval:org.mitre.oval:def:16384",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16384"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2022-05-13T14:52Z",
"publishedDate": "2013-02-02T00:55Z"
}
}
}
RHSA-2013:0236
Vulnerability from csaf_redhat - Published: 2013-02-04 23:50 - Updated: 2025-11-21 17:42Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "incorrect checks for proxy classes" in the Reflection API.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the installation process of the client.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient clipboard access premission checks."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka "missing serialization restriction."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a "small subgroup attack" to force the use of weak session keys or obtain sensitive information about the private key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of "access control context" in the JMX RequiredModelMBean class.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "IIOP type reuse management" in ObjectStreamClass.java.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via "certain value handler constructors."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" that can trigger an integer overflow and memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" in awt_parseImage.c, which triggers memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-sun packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Oracle Java SE version 6 includes the Oracle Java Runtime Environment and\nthe Oracle Java Software Development Kit.\n\nThis update fixes several vulnerabilities in the Oracle Java Runtime\nEnvironment and the Oracle Java Software Development Kit. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch Update Advisory page, listed in the References section.\n(CVE-2012-1541, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0409,\nCVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426,\nCVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0432,\nCVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438, CVE-2013-0440,\nCVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445, CVE-2013-0446,\nCVE-2013-0450, CVE-2013-1473, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478,\nCVE-2013-1480, CVE-2013-1481)\n\nAll users of java-1.6.0-sun are advised to upgrade to these updated\npackages, which provide Oracle Java 6 Update 39. All running instances of\nOracle Java must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0236",
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"category": "external",
"summary": "859140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140"
},
{
"category": "external",
"summary": "860652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652"
},
{
"category": "external",
"summary": "906813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813"
},
{
"category": "external",
"summary": "906892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892"
},
{
"category": "external",
"summary": "906894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894"
},
{
"category": "external",
"summary": "906899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899"
},
{
"category": "external",
"summary": "906900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900"
},
{
"category": "external",
"summary": "906904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904"
},
{
"category": "external",
"summary": "906911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911"
},
{
"category": "external",
"summary": "906914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914"
},
{
"category": "external",
"summary": "906916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916"
},
{
"category": "external",
"summary": "906917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917"
},
{
"category": "external",
"summary": "906918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918"
},
{
"category": "external",
"summary": "906921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921"
},
{
"category": "external",
"summary": "906923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923"
},
{
"category": "external",
"summary": "906930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906930"
},
{
"category": "external",
"summary": "906933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933"
},
{
"category": "external",
"summary": "906935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935"
},
{
"category": "external",
"summary": "907207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207"
},
{
"category": "external",
"summary": "907219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219"
},
{
"category": "external",
"summary": "907223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223"
},
{
"category": "external",
"summary": "907224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224"
},
{
"category": "external",
"summary": "907226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226"
},
{
"category": "external",
"summary": "907340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340"
},
{
"category": "external",
"summary": "907344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344"
},
{
"category": "external",
"summary": "907346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346"
},
{
"category": "external",
"summary": "907453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453"
},
{
"category": "external",
"summary": "907455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455"
},
{
"category": "external",
"summary": "907456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456"
},
{
"category": "external",
"summary": "907457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457"
},
{
"category": "external",
"summary": "907458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458"
},
{
"category": "external",
"summary": "907460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0236.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-sun security update",
"tracking": {
"current_release_date": "2025-11-21T17:42:05+00:00",
"generator": {
"date": "2025-11-21T17:42:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2013:0236",
"initial_release_date": "2013-02-04T23:50:00+00:00",
"revision_history": [
{
"date": "2013-02-04T23:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-02-04T23:53:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:42:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_id": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_id": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-1541",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906914"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1541"
},
{
"category": "external",
"summary": "RHBZ#906914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2012-3213",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907223"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3213"
},
{
"category": "external",
"summary": "RHBZ#907223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)"
},
{
"cve": "CVE-2012-3342",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906917"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3342"
},
{
"category": "external",
"summary": "RHBZ#906917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0351",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906923"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0351"
},
{
"category": "external",
"summary": "RHBZ#906923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0351"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0409",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907226"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0409"
},
{
"category": "external",
"summary": "RHBZ#907226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)"
},
{
"cve": "CVE-2013-0419",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906918"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0419"
},
{
"category": "external",
"summary": "RHBZ#906918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0423",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906921"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0423"
},
{
"category": "external",
"summary": "RHBZ#906921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0423"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0424",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906813"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0424"
},
{
"category": "external",
"summary": "RHBZ#906813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)"
},
{
"cve": "CVE-2013-0425",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907344"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0425"
},
{
"category": "external",
"summary": "RHBZ#907344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)"
},
{
"cve": "CVE-2013-0426",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907346"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0426"
},
{
"category": "external",
"summary": "RHBZ#907346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)"
},
{
"cve": "CVE-2013-0427",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907455"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0427"
},
{
"category": "external",
"summary": "RHBZ#907455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)"
},
{
"cve": "CVE-2013-0428",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907207"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0428"
},
{
"category": "external",
"summary": "RHBZ#907207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)"
},
{
"cve": "CVE-2013-0429",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907460"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0429"
},
{
"category": "external",
"summary": "RHBZ#907460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0429"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)"
},
{
"cve": "CVE-2013-0430",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906930"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the installation process of the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Install)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0430"
},
{
"category": "external",
"summary": "RHBZ#906930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0430"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0430",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0430"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Install)"
},
{
"cve": "CVE-2013-0432",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907219"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0432"
},
{
"category": "external",
"summary": "RHBZ#907219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)"
},
{
"cve": "CVE-2013-0433",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907456"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0433"
},
{
"category": "external",
"summary": "RHBZ#907456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)"
},
{
"cve": "CVE-2013-0434",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907453"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0434"
},
{
"category": "external",
"summary": "RHBZ#907453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)"
},
{
"cve": "CVE-2013-0435",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906892"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0435"
},
{
"category": "external",
"summary": "RHBZ#906892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)"
},
{
"cve": "CVE-2013-0438",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906935"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0438"
},
{
"category": "external",
"summary": "RHBZ#906935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0440",
"discovery_date": "2012-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "859140"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0440"
},
{
"category": "external",
"summary": "RHBZ#859140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)"
},
{
"cve": "CVE-2013-0441",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907458"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing serialization restriction (CORBA, 7201066)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0441"
},
{
"category": "external",
"summary": "RHBZ#907458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing serialization restriction (CORBA, 7201066)"
},
{
"cve": "CVE-2013-0442",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906899"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0442"
},
{
"category": "external",
"summary": "RHBZ#906899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)"
},
{
"cve": "CVE-2013-0443",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907340"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0443"
},
{
"category": "external",
"summary": "RHBZ#907340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)"
},
{
"cve": "CVE-2013-0445",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906900"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0445"
},
{
"category": "external",
"summary": "RHBZ#906900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)"
},
{
"cve": "CVE-2013-0446",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906916"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0446"
},
{
"category": "external",
"summary": "RHBZ#906916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0446"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0450",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906911"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0450"
},
{
"category": "external",
"summary": "RHBZ#906911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)"
},
{
"cve": "CVE-2013-1473",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906933"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1473"
},
{
"category": "external",
"summary": "RHBZ#906933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1473"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-1475",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "860652"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"IIOP type reuse management\" in ObjectStreamClass.java.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1475"
},
{
"category": "external",
"summary": "RHBZ#860652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)"
},
{
"cve": "CVE-2013-1476",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907457"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1476"
},
{
"category": "external",
"summary": "RHBZ#907457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)"
},
{
"cve": "CVE-2013-1478",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906894"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1478"
},
{
"category": "external",
"summary": "RHBZ#906894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)"
},
{
"cve": "CVE-2013-1480",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906904"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1480"
},
{
"category": "external",
"summary": "RHBZ#906904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)"
},
{
"cve": "CVE-2013-1481",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907224"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1481"
},
{
"category": "external",
"summary": "RHBZ#907224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-04T23:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586",
"5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686",
"6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 (Sound)"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.