TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2012-0507

CRITICALCISA KEV
9.8

Beschreibung

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht6/7/2012
Zuletzt geandert10/22/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerOracle
ProduktJava SE
SchwachstellennameOracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability
KEV Aufnahmedatum2022-03-03
Behebungsfrist2022-03-24
Ransomware-NutzungKnown

Betroffene Produkte

debian:debian_linuxoracle:jresun:jresuse:linux_enterprise_desktopsuse:linux_enterprise_javasuse:linux_enterprise_serversuse:linux_enterprise_software_development_kit

Schwachen (CWE)

CWE-843

Referenzen

http://secunia.com/advisories/48589(secalert_us@oracle.com)
http://secunia.com/advisories/48692(secalert_us@oracle.com)
http://secunia.com/advisories/48915(secalert_us@oracle.com)
http://secunia.com/advisories/48948(secalert_us@oracle.com)
http://secunia.com/advisories/48950(secalert_us@oracle.com)
http://marc.info/?l=bugtraq&m=133364885411663&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=133365109612558&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=133847939902305&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=134254866602253&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=134254957702612&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-0508.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-0514.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2013-1455.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48589(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48692(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48915(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48948(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48950(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2012/dsa-2420(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/52161(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=788994(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.