jvndb-2005-000776
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 00:00
Summary
Java Cryptography Extension 1.2.1 (JCE 1.2.1) will no longer function properly after July 28, 2005 due to the expiration of its digital certificate
Details
The digital certificate that was used to sign jar files in the Java Cryptography Extension (JCE) 1.2.1 expires on July 28, 2005. JCE 1.2.1 limits program behaviors after the expiration of the digital certificate. As a result, specific methods of JCE 1.2.1 will no longer work properly after the expiration, and problems may occur, such as an application using JCE does not start.
If you use JCE in Java application development, please check the version of JCE used. If you use J2SE 1.2.x or J2SE 1.3.x to develop Java applications, JCE 1.2.1 may be included as an optional package.
This issue, caused by the expiration of the digital certificate, is not a vulnerability; however, we provide this JVN article to publicize the issue to users.
*1 JPCERT/CC coordinated this issue based on the publicly available information.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN93926203/index.html | |
JPCERT-WR | http://www.jpcert.or.jp/wr/2005/wr052701.txt |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2005/JVNDB-2005-000776.html", "dc:date": "2008-05-21T00:00+09:00", "dcterms:issued": "2008-05-21T00:00+09:00", "dcterms:modified": "2008-05-21T00:00+09:00", "description": "The digital certificate that was used to sign jar files in the Java Cryptography Extension (JCE) 1.2.1 expires on July 28, 2005. JCE 1.2.1 limits program behaviors after the expiration of the digital certificate. As a result, specific methods of JCE 1.2.1 will no longer work properly after the expiration, and problems may occur, such as an application using JCE does not start.\r\n\r\nIf you use JCE in Java application development, please check the version of JCE used. If you use J2SE 1.2.x or J2SE 1.3.x to develop Java applications, JCE 1.2.1 may be included as an optional package.\r\n\r\nThis issue, caused by the expiration of the digital certificate, is not a vulnerability; however, we provide this JVN article to publicize the issue to users.\r\n\r\n*1 JPCERT/CC coordinated this issue based on the publicly available information.", "link": "https://jvndb.jvn.jp/en/contents/2005/JVNDB-2005-000776.html", "sec:cpe": [ { "#text": "cpe:/a:adobe:coldfusion", "@product": "Adobe ColdFusion", "@vendor": "Adobe Inc.", "@version": "2.2" }, { "#text": "cpe:/a:adobe:jrun", "@product": "Adobe JRun", "@vendor": "Adobe Inc.", "@version": "2.2" }, { "#text": "cpe:/a:apc:powerchute", "@product": "PowerChute", "@vendor": "Schneider Electric", "@version": "2.2" }, { "#text": "cpe:/a:bea:weblogic_express", "@product": "BEA WebLogic Express", "@vendor": "BEA Systems, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:bea:weblogic_platform", "@product": "BEA WebLogic Platform", "@vendor": "BEA Systems, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:bea:weblogic_server", "@product": "BEA WebLogic Server", "@vendor": "BEA Systems, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:cisco:wan_manager", "@product": "Cisco WAN Manager (CWM)", "@vendor": "Cisco Systems, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:cisco:wireless_lan_solution_engine", "@product": "CiscoWorks Wireless LAN Solution Engine (CWWLSE)", "@vendor": "Cisco Systems, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:fujitsu:interstage_application_server", "@product": "Interstage Application Server", "@vendor": "FUJITSU", "@version": "2.2" }, { "#text": "cpe:/a:fujitsu:powerchute", "@product": "PowerChute", "@vendor": "FUJITSU", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server", "@product": "Cosminexus Server", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_web_contents_generator", "@product": "Cosminexus Web Contents Generator", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:ibm:java_jce", "@product": "IBM JCE", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:java_jdk", "@product": "IBM JDK", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:java_jre", "@product": "IBM JRE", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:misc:infoteria_asteria_r2_flow_builder", "@product": "ASTERIA R2 Flow Builder", "@vendor": "Infoteria Corporation", "@version": "2.2" }, { "#text": "cpe:/a:misc:infoteria_asteria_r2_server", "@product": "ASTERIA R2 Server", "@vendor": "Infoteria Corporation", "@version": "2.2" }, { "#text": "cpe:/a:nec:esmpro_upsmanager", "@product": "ESMPRO/UPSManager", "@vendor": "NEC Corporation", "@version": "2.2" }, { "#text": "cpe:/a:nec:powerchute", "@product": "PowerChute", "@vendor": "NEC Corporation", "@version": "2.2" }, { "#text": "cpe:/a:sun:j2se", "@product": "J2SE", "@vendor": "Sun Microsystems, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:sun:jce", "@product": "JCE", "@vendor": "Sun Microsystems, Inc.", "@version": "2.2" }, { "#text": "cpe:/h:cisco:hosting_solution_engine", "@product": "CiscoWorks Host Solution Engine (HSE)", "@vendor": "Cisco Systems, Inc.", "@version": "2.2" }, { "#text": "cpe:/h:fujitsu:primergy", "@product": "PRIMERGY", "@vendor": "FUJITSU", "@version": "2.2" }, { "#text": "cpe:/h:hitachi:ha8000", "@product": "HA8000 Series", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/h:mcafee:intrushield_security_management_system", "@product": "McAfee IntruShield", "@vendor": "McAfee", "@version": "2.2" } ], "sec:cvss": { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2005-000776", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN93926203/index.html", "@id": "JVN#93926203", "@source": "JVN" }, { "#text": "http://www.jpcert.or.jp/wr/2005/wr052701.txt", "@id": "JPCERT-WR-2005-2701", "@source": "JPCERT-WR" } ], "title": "Java Cryptography Extension 1.2.1 (JCE 1.2.1) will no longer function properly after July 28, 2005 due to the expiration of its digital certificate" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.