TROYANOSYVIRUS
Voltar para CVEs

CVE-2016-3427

CRITICALCISA KEV
9.8

Descricao

Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.

Detalhes CVE

Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado4/21/2016
Ultima modificacao4/22/2026
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorOracle
ProdutoJava SE and JRockit
Nome da vulnerabilidadeOracle Java SE and JRockit Unspecified Vulnerability
Data inclusao KEV2023-05-12
Prazo de remediacao2023-06-02
Uso em ransomwareUnknown

Produtos afetados

apache:cassandracanonical:ubuntu_linuxdebian:debian_linuxnetapp:e-series_santricity_management_plug-insnetapp:e-series_santricity_storage_managernetapp:e-series_santricity_web_servicesnetapp:oncommand_balancenetapp:oncommand_cloud_managernetapp:oncommand_insightnetapp:oncommand_performance_managernetapp:oncommand_reportnetapp:oncommand_shiftnetapp:oncommand_unified_managernetapp:oncommand_workflow_automationnetapp:storagegridnetapp:vasa_provider_for_clustered_data_ontapnetapp:virtual_storage_consoleopensuse:leapopensuse:opensuseoracle:jdkoracle:jreoracle:jrockitoracle:linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:satellitesuse:linux_enterprise_desktopsuse:linux_enterprise_module_for_legacysuse:linux_enterprise_serversuse:linux_enterprise_software_development_kitsuse:managersuse:manager_proxysuse:openstack_cloud

Fraquezas (CWE)

CWE-284

Referencias

http://www.ubuntu.com/usn/USN-2963-1(secalert_us@oracle.com)
http://www.ubuntu.com/usn/USN-2964-1(secalert_us@oracle.com)
http://www.ubuntu.com/usn/USN-2972-1(secalert_us@oracle.com)
http://rhn.redhat.com/errata/RHSA-2016-0650.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0651.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0675.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0676.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0677.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0678.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0679.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0701.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0702.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0708.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0716.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0723.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-1039.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3558(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2020/08/31/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/86421(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1035596(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1037331(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2963-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2964-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2972-1(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2016:1430(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1216(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201606-18(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20160420-0001/(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.