Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-3698 (GCVE-0-2007-3698)
Vulnerability from cvelistv5 – Published: 2007-07-11 22:00 – Updated: 2024-08-07 14:28- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:28:51.621Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2008:0132",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0132.html"
},
{
"name": "RHSA-2007:0818",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0818.html"
},
{
"name": "ADV-2007-2660",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2660"
},
{
"name": "26933",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26933"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"name": "24846",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/24846"
},
{
"name": "26314",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26314"
},
{
"name": "oval:org.mitre.oval:def:10634",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
},
{
"name": "20070725 Vulnerability in Java Secure Socket Extension",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html"
},
{
"name": "sun-jsse-ssltls-dos(35333)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35333"
},
{
"name": "29897",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29897"
},
{
"name": "26015",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26015"
},
{
"name": "28056",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28056"
},
{
"name": "APPLE-SA-2007-12-14",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"name": "RHSA-2008:0100",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
},
{
"name": "26221",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26221"
},
{
"name": "SUSE-SA:2008:025",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
},
{
"name": "RHSA-2007:0956",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
},
{
"name": "26645",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26645"
},
{
"name": "SSRT071465",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"name": "28777",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28777"
},
{
"name": "HPSBMA02288",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"name": "1018357",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018357"
},
{
"name": "ADV-2007-4224",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/4224"
},
{
"name": "ADV-2007-3861",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3861"
},
{
"name": "ADV-2007-3009",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3009"
},
{
"name": "102997",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1"
},
{
"name": "28880",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28880"
},
{
"name": "27716",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27716"
},
{
"name": "36663",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/36663"
},
{
"name": "GLSA-200709-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
},
{
"name": "28115",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28115"
},
{
"name": "29340",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29340"
},
{
"name": "ADV-2007-2495",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2495"
},
{
"name": "RHSA-2007:1086",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
},
{
"name": "27203",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27203"
},
{
"name": "26631",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26631"
},
{
"name": "BEA07-178.00",
"tags": [
"vendor-advisory",
"x_refsource_BEA",
"x_transferred"
],
"url": "http://dev2dev.bea.com/pub/advisory/249"
},
{
"name": "27635",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27635"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-07-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "RHSA-2008:0132",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0132.html"
},
{
"name": "RHSA-2007:0818",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0818.html"
},
{
"name": "ADV-2007-2660",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2660"
},
{
"name": "26933",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26933"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"name": "24846",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/24846"
},
{
"name": "26314",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26314"
},
{
"name": "oval:org.mitre.oval:def:10634",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
},
{
"name": "20070725 Vulnerability in Java Secure Socket Extension",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html"
},
{
"name": "sun-jsse-ssltls-dos(35333)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35333"
},
{
"name": "29897",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29897"
},
{
"name": "26015",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26015"
},
{
"name": "28056",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28056"
},
{
"name": "APPLE-SA-2007-12-14",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"name": "RHSA-2008:0100",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
},
{
"name": "26221",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26221"
},
{
"name": "SUSE-SA:2008:025",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
},
{
"name": "RHSA-2007:0956",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
},
{
"name": "26645",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26645"
},
{
"name": "SSRT071465",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"name": "28777",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28777"
},
{
"name": "HPSBMA02288",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"name": "1018357",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018357"
},
{
"name": "ADV-2007-4224",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/4224"
},
{
"name": "ADV-2007-3861",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3861"
},
{
"name": "ADV-2007-3009",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3009"
},
{
"name": "102997",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1"
},
{
"name": "28880",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28880"
},
{
"name": "27716",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27716"
},
{
"name": "36663",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/36663"
},
{
"name": "GLSA-200709-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
},
{
"name": "28115",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28115"
},
{
"name": "29340",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29340"
},
{
"name": "ADV-2007-2495",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2495"
},
{
"name": "RHSA-2007:1086",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
},
{
"name": "27203",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27203"
},
{
"name": "26631",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26631"
},
{
"name": "BEA07-178.00",
"tags": [
"vendor-advisory",
"x_refsource_BEA"
],
"url": "http://dev2dev.bea.com/pub/advisory/249"
},
{
"name": "27635",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27635"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-3698",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2008:0132",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0132.html"
},
{
"name": "RHSA-2007:0818",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0818.html"
},
{
"name": "ADV-2007-2660",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2660"
},
{
"name": "26933",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26933"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307177",
"refsource": "MISC",
"url": "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"name": "24846",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24846"
},
{
"name": "26314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26314"
},
{
"name": "oval:org.mitre.oval:def:10634",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634"
},
{
"name": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
},
{
"name": "20070725 Vulnerability in Java Secure Socket Extension",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html"
},
{
"name": "sun-jsse-ssltls-dos(35333)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35333"
},
{
"name": "29897",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29897"
},
{
"name": "26015",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26015"
},
{
"name": "28056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28056"
},
{
"name": "APPLE-SA-2007-12-14",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"name": "RHSA-2008:0100",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
},
{
"name": "26221",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26221"
},
{
"name": "SUSE-SA:2008:025",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
},
{
"name": "RHSA-2007:0956",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
},
{
"name": "26645",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26645"
},
{
"name": "SSRT071465",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"name": "28777",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28777"
},
{
"name": "HPSBMA02288",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"name": "1018357",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018357"
},
{
"name": "ADV-2007-4224",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4224"
},
{
"name": "ADV-2007-3861",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3861"
},
{
"name": "ADV-2007-3009",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3009"
},
{
"name": "102997",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1"
},
{
"name": "28880",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28880"
},
{
"name": "27716",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27716"
},
{
"name": "36663",
"refsource": "OSVDB",
"url": "http://osvdb.org/36663"
},
{
"name": "GLSA-200709-15",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
},
{
"name": "28115",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28115"
},
{
"name": "29340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29340"
},
{
"name": "ADV-2007-2495",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2495"
},
{
"name": "RHSA-2007:1086",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
},
{
"name": "27203",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27203"
},
{
"name": "26631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26631"
},
{
"name": "BEA07-178.00",
"refsource": "BEA",
"url": "http://dev2dev.bea.com/pub/advisory/249"
},
{
"name": "27635",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27635"
},
{
"name": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-3698",
"datePublished": "2007-07-11T22:00:00.000Z",
"dateReserved": "2007-07-11T00:00:00.000Z",
"dateUpdated": "2024-08-07T14:28:51.621Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2007-3698",
"date": "2026-05-19",
"epss": "0.19037",
"percentile": "0.95415"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AADA633-EB11-49A0-8E40-66589034F03E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*\", \"matchCriteriaId\": \"19DC29C5-1B9F-46DF-ACF6-3FF93E45777D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC0ABF7A-107B-4B97-9BD7-7B0CEDAAF359\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5DA4242-30D9-44C8-9D0D-877348FFA22B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*\", \"matchCriteriaId\": \"C61C6043-99D0-4F36-AF84-1A5F90B895EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD30DAEB-4893-41CF-A455-B69C463B9337\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88519F2D-AD06-4F05-BEDA-A09216F1B481\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC728978-368D-4B36-B149-70473E92BD1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD5187B1-CB86-48E8-A595-9FCFD9822C0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C660DE4-543A-4E9B-825D-CD099D08CBD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*\", \"matchCriteriaId\": \"A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*\", \"matchCriteriaId\": \"9919D091-73D7-465A-80FF-F37D6CAF9F46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*\", \"matchCriteriaId\": \"46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBE909DE-E55A-4BD3-A5BF-ADE407432193\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DAC04D2-68FD-4793-A8E7-4690A543D7D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"09027C19-D442-446F-B7A8-21DB6787CF43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F34C99E6-F9F0-4EF3-8601-B47EAE3D7273\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A74DD08D-CEDB-460E-BED5-78F6CAF18BF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4F64FBC-DC97-4FE3-A235-18B87945AF7A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.\"}, {\"lang\": \"es\", \"value\": \"El Java Secure Socket Extension (JSSE) en Sun JDK y JRE versi\\u00f3n 6 Update 1 y anteriores, JDK y JRE versi\\u00f3n 5.0 Updates 7 hasta 11, y SDK y JRE versi\\u00f3n 1.4.2_11 hasta 1.4.2_14, cuando se usa JSSE para soporte SSL/TLS, permite a los atacantes remotos causar una denegaci\\u00f3n de servicio (consumo de CPU) por medio de ciertas peticiones de protocolo de enlace SSL/TLS.\"}]",
"id": "CVE-2007-3698",
"lastModified": "2024-11-21T00:33:51.193",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2007-07-11T22:30:00.000",
"references": "[{\"url\": \"http://dev2dev.bea.com/pub/advisory/249\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://docs.info.apple.com/article.html?artnum=307177\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/36663\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/26015\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26221\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26314\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26631\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26645\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26933\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/27203\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/27635\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/27716\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28056\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28115\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28777\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28880\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29340\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29897\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0818.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0956.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1086.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0100.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0132.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/bid/24846\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1018357\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2495\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2660\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3009\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3861\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/4224\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/35333\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://dev2dev.bea.com/pub/advisory/249\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://docs.info.apple.com/article.html?artnum=307177\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/36663\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26015\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26221\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26314\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26631\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26645\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26933\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/27203\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/27635\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/27716\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28056\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28115\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28777\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28880\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29340\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29897\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0818.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0956.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1086.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0100.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0132.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/bid/24846\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1018357\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2495\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2660\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3009\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3861\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/4224\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/35333\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-3698\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-07-11T22:30:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.\"},{\"lang\":\"es\",\"value\":\"El Java Secure Socket Extension (JSSE) en Sun JDK y JRE versi\u00f3n 6 Update 1 y anteriores, JDK y JRE versi\u00f3n 5.0 Updates 7 hasta 11, y SDK y JRE versi\u00f3n 1.4.2_11 hasta 1.4.2_14, cuando se usa JSSE para soporte SSL/TLS, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU) por medio de ciertas peticiones de protocolo de enlace SSL/TLS.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AADA633-EB11-49A0-8E40-66589034F03E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DC29C5-1B9F-46DF-ACF6-3FF93E45777D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC0ABF7A-107B-4B97-9BD7-7B0CEDAAF359\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5DA4242-30D9-44C8-9D0D-877348FFA22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"C61C6043-99D0-4F36-AF84-1A5F90B895EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD30DAEB-4893-41CF-A455-B69C463B9337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88519F2D-AD06-4F05-BEDA-A09216F1B481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC728978-368D-4B36-B149-70473E92BD1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD5187B1-CB86-48E8-A595-9FCFD9822C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C660DE4-543A-4E9B-825D-CD099D08CBD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"9919D091-73D7-465A-80FF-F37D6CAF9F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE909DE-E55A-4BD3-A5BF-ADE407432193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DAC04D2-68FD-4793-A8E7-4690A543D7D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"09027C19-D442-446F-B7A8-21DB6787CF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F34C99E6-F9F0-4EF3-8601-B47EAE3D7273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74DD08D-CEDB-460E-BED5-78F6CAF18BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F64FBC-DC97-4FE3-A235-18B87945AF7A\"}]}]}],\"references\":[{\"url\":\"http://dev2dev.bea.com/pub/advisory/249\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307177\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/36663\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/26015\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26221\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26314\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26631\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26645\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26933\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27203\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27635\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27716\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28056\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28115\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28777\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28880\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29340\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29897\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0818.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0956.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1086.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0100.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0132.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/24846\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1018357\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2495\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2660\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/3009\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/3861\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/4224\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/35333\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://dev2dev.bea.com/pub/advisory/249\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/36663\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26314\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26645\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27203\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27635\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27716\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28056\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28777\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28880\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29897\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0818.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0956.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1086.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0100.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0132.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/24846\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1018357\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2660\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/3009\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/3861\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/4224\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/35333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2007-AVI-546
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Java pour Mac OS X.
Description
De multiples vulérabilités de Java pour Mac OS X ont été découvertes. Les vulnérabilités les plus importantes permettent :
- un contournement de la politique de sécurité via une appliquette spécialement conçue permettant la suppression et l'insertion d'objets ;
- une exécution de code arbitraire à distance et une élévation de privilèges via une vulnérabilité de Java 1.4 ;
- une exécution de code arbitraire à distance et une élévation de privilèges via une vulnérabilité de J2SE 5.0.
Solution
Se référer au bulletin de sécurité Apple 307177 pour l'obtention des correctifs (cf. section Documentation).
Mac OS X version 10.4.10 et les versions antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eMac OS X version 10.4.10 et les versions ant\u00e9rieures.\u003c/P\u003e",
"content": "## Description\n\nDe multiples vul\u00e9rabilit\u00e9s de Java pour Mac OS X ont \u00e9t\u00e9 d\u00e9couvertes.\nLes vuln\u00e9rabilit\u00e9s les plus importantes permettent :\n\n- un contournement de la politique de s\u00e9curit\u00e9 via une appliquette\n sp\u00e9cialement con\u00e7ue permettant la suppression et l\u0027insertion\n d\u0027objets ;\n- une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de\n privil\u00e8ges via une vuln\u00e9rabilit\u00e9 de Java 1.4 ;\n- une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de\n privil\u00e8ges via une vuln\u00e9rabilit\u00e9 de J2SE 5.0.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Apple 307177 pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2788"
},
{
"name": "CVE-2006-4339",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4339"
},
{
"name": "CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"name": "CVE-2007-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3698"
},
{
"name": "CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"name": "CVE-2007-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0243"
},
{
"name": "CVE-2007-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
},
{
"name": "CVE-2006-6731",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6731"
},
{
"name": "CVE-2007-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3655"
},
{
"name": "CVE-2007-5862",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5862"
},
{
"name": "CVE-2006-6745",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6745"
},
{
"name": "CVE-2007-4381",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4381"
},
{
"name": "CVE-2007-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3504"
},
{
"name": "CVE-2006-6736",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6736"
},
{
"name": "CVE-2007-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3005"
},
{
"name": "CVE-2007-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2789"
},
{
"name": "CVE-2007-5232",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5232"
},
{
"name": "CVE-2007-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2435"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 307177 du 12 d\u00e9cembre 2007 :",
"url": "http://docs.info.apple.com/article.html?artnum=307177"
}
],
"reference": "CERTA-2007-AVI-546",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-12-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Java pour Mac OS X.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Apple 307177 du 12 d\u00e9cembre 2007",
"url": null
}
]
}
CERTA-2007-AVI-546
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Java pour Mac OS X.
Description
De multiples vulérabilités de Java pour Mac OS X ont été découvertes. Les vulnérabilités les plus importantes permettent :
- un contournement de la politique de sécurité via une appliquette spécialement conçue permettant la suppression et l'insertion d'objets ;
- une exécution de code arbitraire à distance et une élévation de privilèges via une vulnérabilité de Java 1.4 ;
- une exécution de code arbitraire à distance et une élévation de privilèges via une vulnérabilité de J2SE 5.0.
Solution
Se référer au bulletin de sécurité Apple 307177 pour l'obtention des correctifs (cf. section Documentation).
Mac OS X version 10.4.10 et les versions antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eMac OS X version 10.4.10 et les versions ant\u00e9rieures.\u003c/P\u003e",
"content": "## Description\n\nDe multiples vul\u00e9rabilit\u00e9s de Java pour Mac OS X ont \u00e9t\u00e9 d\u00e9couvertes.\nLes vuln\u00e9rabilit\u00e9s les plus importantes permettent :\n\n- un contournement de la politique de s\u00e9curit\u00e9 via une appliquette\n sp\u00e9cialement con\u00e7ue permettant la suppression et l\u0027insertion\n d\u0027objets ;\n- une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de\n privil\u00e8ges via une vuln\u00e9rabilit\u00e9 de Java 1.4 ;\n- une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de\n privil\u00e8ges via une vuln\u00e9rabilit\u00e9 de J2SE 5.0.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Apple 307177 pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2788"
},
{
"name": "CVE-2006-4339",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4339"
},
{
"name": "CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"name": "CVE-2007-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3698"
},
{
"name": "CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"name": "CVE-2007-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0243"
},
{
"name": "CVE-2007-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
},
{
"name": "CVE-2006-6731",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6731"
},
{
"name": "CVE-2007-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3655"
},
{
"name": "CVE-2007-5862",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5862"
},
{
"name": "CVE-2006-6745",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6745"
},
{
"name": "CVE-2007-4381",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4381"
},
{
"name": "CVE-2007-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3504"
},
{
"name": "CVE-2006-6736",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6736"
},
{
"name": "CVE-2007-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3005"
},
{
"name": "CVE-2007-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2789"
},
{
"name": "CVE-2007-5232",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5232"
},
{
"name": "CVE-2007-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2435"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 307177 du 12 d\u00e9cembre 2007 :",
"url": "http://docs.info.apple.com/article.html?artnum=307177"
}
],
"reference": "CERTA-2007-AVI-546",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-12-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Java pour Mac OS X.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Apple 307177 du 12 d\u00e9cembre 2007",
"url": null
}
]
}
FKIE_CVE-2007-3698
Vulnerability from fkie_nvd - Published: 2007-07-11 22:30 - Updated: 2026-04-23 00:35| Vendor | Product | Version | |
|---|---|---|---|
| sun | jdk | 1.5.0 | |
| sun | jdk | 1.5.0 | |
| sun | jdk | 1.5.0 | |
| sun | jdk | 1.5.0 | |
| sun | jdk | 1.5.0 | |
| sun | jdk | 1.6.0 | |
| sun | jre | 1.4.2_11 | |
| sun | jre | 1.4.2_12 | |
| sun | jre | 1.4.2_13 | |
| sun | jre | 1.4.2_14 | |
| sun | jre | 1.5.0 | |
| sun | jre | 1.5.0 | |
| sun | jre | 1.5.0 | |
| sun | jre | 1.5.0 | |
| sun | jre | 1.5.0 | |
| sun | jre | 1.6.0 | |
| sun | sdk | 1.4.2_11 | |
| sun | sdk | 1.4.2_12 | |
| sun | sdk | 1.4.2_13 | |
| sun | sdk | 1.4.2_14 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"matchCriteriaId": "2AADA633-EB11-49A0-8E40-66589034F03E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"matchCriteriaId": "19DC29C5-1B9F-46DF-ACF6-3FF93E45777D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"matchCriteriaId": "DC0ABF7A-107B-4B97-9BD7-7B0CEDAAF359",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"matchCriteriaId": "A5DA4242-30D9-44C8-9D0D-877348FFA22B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"matchCriteriaId": "C61C6043-99D0-4F36-AF84-1A5F90B895EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "AD30DAEB-4893-41CF-A455-B69C463B9337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"matchCriteriaId": "A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"matchCriteriaId": "9919D091-73D7-465A-80FF-F37D6CAF9F46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"matchCriteriaId": "46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"matchCriteriaId": "EBE909DE-E55A-4BD3-A5BF-ADE407432193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"matchCriteriaId": "5DAC04D2-68FD-4793-A8E7-4690A543D7D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests."
},
{
"lang": "es",
"value": "El Java Secure Socket Extension (JSSE) en Sun JDK y JRE versi\u00f3n 6 Update 1 y anteriores, JDK y JRE versi\u00f3n 5.0 Updates 7 hasta 11, y SDK y JRE versi\u00f3n 1.4.2_11 hasta 1.4.2_14, cuando se usa JSSE para soporte SSL/TLS, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU) por medio de ciertas peticiones de protocolo de enlace SSL/TLS."
}
],
"id": "CVE-2007-3698",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-07-11T22:30:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://dev2dev.bea.com/pub/advisory/249"
},
{
"source": "cve@mitre.org",
"url": "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"source": "cve@mitre.org",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/36663"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26015"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26221"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26314"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26631"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26645"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26933"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27203"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27635"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27716"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28056"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28115"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28777"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28880"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29340"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29897"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1"
},
{
"source": "cve@mitre.org",
"url": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml"
},
{
"source": "cve@mitre.org",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0818.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0132.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/24846"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018357"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2495"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2660"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/3009"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/3861"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/4224"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35333"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://dev2dev.bea.com/pub/advisory/249"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/36663"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26015"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26314"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26631"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26645"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26933"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27203"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27635"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27716"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28056"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28115"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28777"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28880"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29340"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29897"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0818.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0132.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/24846"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018357"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2495"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2660"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/3009"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/3861"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/4224"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35333"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-5P3V-G8H5-7GG9
Vulnerability from github – Published: 2022-05-01 18:16 – Updated: 2022-05-01 18:16The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.
{
"affected": [],
"aliases": [
"CVE-2007-3698"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2007-07-11T22:30:00Z",
"severity": "HIGH"
},
"details": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.",
"id": "GHSA-5p3v-g8h5-7gg9",
"modified": "2022-05-01T18:16:24Z",
"published": "2022-05-01T18:16:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35333"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634"
},
{
"type": "WEB",
"url": "http://dev2dev.bea.com/pub/advisory/249"
},
{
"type": "WEB",
"url": "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"type": "WEB",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
},
{
"type": "WEB",
"url": "http://osvdb.org/36663"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26015"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26221"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26314"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26631"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26645"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26933"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27203"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27635"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27716"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28056"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28115"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28777"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28880"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29340"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29897"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1"
},
{
"type": "WEB",
"url": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
},
{
"type": "WEB",
"url": "http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html"
},
{
"type": "WEB",
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml"
},
{
"type": "WEB",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0818.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0132.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/24846"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1018357"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/2495"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/2660"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/3009"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/3861"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/4224"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2007-3698
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2007-3698",
"description": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.",
"id": "GSD-2007-3698",
"references": [
"https://www.suse.com/security/cve/CVE-2007-3698.html",
"https://access.redhat.com/errata/RHSA-2008:0132",
"https://access.redhat.com/errata/RHSA-2008:0100",
"https://access.redhat.com/errata/RHSA-2007:1086",
"https://access.redhat.com/errata/RHSA-2007:0956",
"https://access.redhat.com/errata/RHSA-2007:0818"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-3698"
],
"details": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.",
"id": "GSD-2007-3698",
"modified": "2023-12-13T01:21:41.981793Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-3698",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2008:0132",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0132.html"
},
{
"name": "RHSA-2007:0818",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0818.html"
},
{
"name": "ADV-2007-2660",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2660"
},
{
"name": "26933",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26933"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307177",
"refsource": "MISC",
"url": "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"name": "24846",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24846"
},
{
"name": "26314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26314"
},
{
"name": "oval:org.mitre.oval:def:10634",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634"
},
{
"name": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
},
{
"name": "20070725 Vulnerability in Java Secure Socket Extension",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html"
},
{
"name": "sun-jsse-ssltls-dos(35333)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35333"
},
{
"name": "29897",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29897"
},
{
"name": "26015",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26015"
},
{
"name": "28056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28056"
},
{
"name": "APPLE-SA-2007-12-14",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"name": "RHSA-2008:0100",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
},
{
"name": "26221",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26221"
},
{
"name": "SUSE-SA:2008:025",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
},
{
"name": "RHSA-2007:0956",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
},
{
"name": "26645",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26645"
},
{
"name": "SSRT071465",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"name": "28777",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28777"
},
{
"name": "HPSBMA02288",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"name": "1018357",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018357"
},
{
"name": "ADV-2007-4224",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4224"
},
{
"name": "ADV-2007-3861",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3861"
},
{
"name": "ADV-2007-3009",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3009"
},
{
"name": "102997",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1"
},
{
"name": "28880",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28880"
},
{
"name": "27716",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27716"
},
{
"name": "36663",
"refsource": "OSVDB",
"url": "http://osvdb.org/36663"
},
{
"name": "GLSA-200709-15",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
},
{
"name": "28115",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28115"
},
{
"name": "29340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29340"
},
{
"name": "ADV-2007-2495",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2495"
},
{
"name": "RHSA-2007:1086",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
},
{
"name": "27203",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27203"
},
{
"name": "26631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26631"
},
{
"name": "BEA07-178.00",
"refsource": "BEA",
"url": "http://dev2dev.bea.com/pub/advisory/249"
},
{
"name": "27635",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27635"
},
{
"name": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-3698"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "102997",
"refsource": "SUNALERT",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1"
},
{
"name": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml"
},
{
"name": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
},
{
"name": "BEA07-178.00",
"refsource": "BEA",
"tags": [],
"url": "http://dev2dev.bea.com/pub/advisory/249"
},
{
"name": "20070725 Vulnerability in Java Secure Socket Extension",
"refsource": "CISCO",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html"
},
{
"name": "GLSA-200709-15",
"refsource": "GENTOO",
"tags": [],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
},
{
"name": "RHSA-2007:0818",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0818.html"
},
{
"name": "RHSA-2007:0956",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
},
{
"name": "24846",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/24846"
},
{
"name": "1018357",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1018357"
},
{
"name": "26015",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26015"
},
{
"name": "26221",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26221"
},
{
"name": "26314",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26314"
},
{
"name": "26631",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26631"
},
{
"name": "26933",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26933"
},
{
"name": "27203",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27203"
},
{
"name": "26645",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26645"
},
{
"name": "27635",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27635"
},
{
"name": "27716",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27716"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307177",
"refsource": "MISC",
"tags": [],
"url": "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"name": "APPLE-SA-2007-12-14",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"name": "RHSA-2007:1086",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
},
{
"name": "28056",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28056"
},
{
"name": "28115",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28115"
},
{
"name": "28777",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28777"
},
{
"name": "RHSA-2008:0132",
"refsource": "REDHAT",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0132.html"
},
{
"name": "28880",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28880"
},
{
"name": "RHSA-2008:0100",
"refsource": "REDHAT",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
},
{
"name": "29340",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29340"
},
{
"name": "SUSE-SA:2008:025",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
},
{
"name": "29897",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29897"
},
{
"name": "SSRT071465",
"refsource": "HP",
"tags": [],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450"
},
{
"name": "ADV-2007-3861",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/3861"
},
{
"name": "ADV-2007-2495",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2495"
},
{
"name": "ADV-2007-2660",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2660"
},
{
"name": "ADV-2007-4224",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/4224"
},
{
"name": "ADV-2007-3009",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/3009"
},
{
"name": "36663",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/36663"
},
{
"name": "sun-jsse-ssltls-dos(35333)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35333"
},
{
"name": "oval:org.mitre.oval:def:10634",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-30T16:26Z",
"publishedDate": "2007-07-11T22:30Z"
}
}
}
RHSA-2007:0818
Vulnerability from csaf_redhat - Published: 2007-08-06 15:55 - Updated: 2025-11-21 17:32The Javadoc tool in Sun JDK 6 and JDK 5.0 Update 11 can generate HTML documentation pages that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
Stack-based buffer overflow in javaws.exe in Sun Java Web Start in JRE 5.0 Update 11 and earlier, and 6.0 Update 1 and earlier, allows remote attackers to execute arbitrary code via a long codebase attribute in a JNLP file.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) Applet Class Loader in Sun JDK and JRE 5.0 Update 11 and earlier, 6 through 6 Update 1, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to violate the security model for an applet's outbound connections by connecting to certain localhost services running on the machine that loaded the applet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-sun packages that correct several security issues are\navailable for Red Hat Enterprise Linux 4 Extras.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Java Runtime Environment (JRE) contains the software and tools\nthat users need to run applets and applications written using the Java\nprogramming language.\n\nThe Javadoc tool was able to generate HTML documentation pages that\ncontained cross-site scripting (XSS) vulnerabilities. A remote attacker\ncould use this to inject arbitrary web script or HTML. (CVE-2007-3503)\n\nThe Java Web Start URL parsing component contained a buffer overflow\nvulnerability within the parsing code for JNLP files. A remote attacker\ncould create a malicious JNLP file that could trigger this flaw and execute\narbitrary code when opened. (CVE-2007-3655)\n\nThe JSSE component did not correctly process SSL/TLS handshake requests. A\nremote attacker who is able to connect to a JSSE-based service could\ntrigger this flaw leading to a denial-of-service. (CVE-2007-3698)\n\nA flaw was found in the applet class loader. An untrusted applet could use\nthis flaw to circumvent network access restrictions, possibly connecting to\nservices hosted on the machine that executed the applet. (CVE-2007-3922)\n\nAll users of java-sun-1.5.0 should upgrade to these packages, which contain\nSun Java 1.5.0 Update 12 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0818",
"url": "https://access.redhat.com/errata/RHSA-2007:0818"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "246765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=246765"
},
{
"category": "external",
"summary": "248864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248864"
},
{
"category": "external",
"summary": "249533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249533"
},
{
"category": "external",
"summary": "249539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0818.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-sun security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:10+00:00",
"generator": {
"date": "2025-11-21T17:32:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0818",
"initial_release_date": "2007-08-06T15:55:00+00:00",
"revision_history": [
{
"date": "2007-08-06T15:55:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-08-06T11:55:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_id": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.12-1jpp.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_id": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.12-1jpp.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.12-1jpp.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.12-1jpp.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.12-1jpp.2.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-plugin@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3503",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-07-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "246765"
}
],
"notes": [
{
"category": "description",
"text": "The Javadoc tool in Sun JDK 6 and JDK 5.0 Update 11 can generate HTML documentation pages that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTML files generated with Javadoc are vulnerable to a XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3503"
},
{
"category": "external",
"summary": "RHBZ#246765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=246765"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3503"
}
],
"release_date": "2007-06-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-06T15:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0818"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "HTML files generated with Javadoc are vulnerable to a XSS"
},
{
"cve": "CVE-2007-3655",
"discovery_date": "2007-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "248864"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in javaws.exe in Sun Java Web Start in JRE 5.0 Update 11 and earlier, and 6.0 Update 1 and earlier, allows remote attackers to execute arbitrary code via a long codebase attribute in a JNLP file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "A buffer overflow vulnerability in Java Web Start URL parsing code",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3655"
},
{
"category": "external",
"summary": "RHBZ#248864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248864"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3655"
}
],
"release_date": "2007-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-06T15:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0818"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "A buffer overflow vulnerability in Java Web Start URL parsing code"
},
{
"cve": "CVE-2007-3698",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "249539"
}
],
"notes": [
{
"category": "description",
"text": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3698"
},
{
"category": "external",
"summary": "RHBZ#249539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698"
}
],
"release_date": "2007-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-06T15:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0818"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition"
},
{
"cve": "CVE-2007-3922",
"discovery_date": "2007-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "249533"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) Applet Class Loader in Sun JDK and JRE 5.0 Update 11 and earlier, 6 through 6 Update 1, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to violate the security model for an applet\u0027s outbound connections by connecting to certain localhost services running on the machine that loaded the applet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3922"
},
{
"category": "external",
"summary": "RHBZ#249533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3922",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3922"
}
],
"release_date": "2007-07-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-06T15:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0818"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions"
}
]
}
RHSA-2007:0956
Vulnerability from csaf_redhat - Published: 2007-10-16 07:08 - Updated: 2026-01-13 22:34Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
The Javadoc tool in Sun JDK 6 and JDK 5.0 Update 11 can generate HTML documentation pages that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the font parsing implementation in Sun JDK and JRE 5.0 Update 9 and earlier, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to perform unauthorized actions via an applet that grants certain privileges to itself.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-bea packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary. \n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The BEA WebLogic JRockit 1.5.0_11 JRE and SDK contain BEA WebLogic JRockit\nVirtual Machine 1.5.0_11 and are certified for the Java 5 Platform,\nStandard Edition, v1.5.0.\n\nA flaw was found in the BEA Java Runtime Environment GIF image handling. \nIf an application processes untrusted GIF image input, it may be possible\nto execute arbitrary code as the user running the Java Virtual Machine. \n(CVE-2007-0243)\n\nA buffer overflow in the Java Runtime Environment image handling code was\nfound. If an attacker is able to cause a server application to process a\nspecially crafted image file, it may be possible to execute arbitrary code\nas the user running the Java Virtual Machine. (CVE-2007-2788,\nCVE-2007-2789, CVE-2007-3004)\n\nA denial of service flaw was discovered in the Java Applet Viewer. An\nuntrusted Java applet could cause the Java Virtual Machine to become\nunresponsive. Please note that the BEA WebLogic JRockit 1.5.0_11 does not\nship with a browser plug-in and therefore this issue could only be\ntriggered by a user running the \"appletviewer\" application. (CVE-2007-3005)\n\nA cross site scripting (XSS) flaw was found in the Javadoc tool. An\nattacker could inject arbitrary content into a Javadoc generated HTML\ndocumentation page, possibly tricking a user or stealing sensitive\ninformation. (CVE-2007-3503)\n\nA denial of service flaw was found in the way the JSSE component processed\nSSL/TLS handshake requests. A remote attacker able to connect to a JSSE\nenabled service could send a specially crafted handshake which would cause\nthe Java Runtime Environment to stop responding to future requests. \n(CVE-2007-3698)\n\nA flaw was found in the way the Java Runtime Environment processes font\ndata. An applet viewed via the \u0027appletviewer\u0027 application could elevate\nits privileges, allowing the applet to perform actions with the same\npermissions as the user running the \"appletviewer\" application. It may also\nbe possible to crash a server application which processes untrusted font\ninformation from a third party. (CVE-2007-4381)\n\nAll users of java-bea-1.5.0 should upgrade to these updated packages, which\ncontain the BEA WebLogic JRockit 1.5.0_11 release that resolves these\nissues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0956",
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "242595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242595"
},
{
"category": "external",
"summary": "246765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=246765"
},
{
"category": "external",
"summary": "249539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539"
},
{
"category": "external",
"summary": "250725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250725"
},
{
"category": "external",
"summary": "250729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250729"
},
{
"category": "external",
"summary": "250733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250733"
},
{
"category": "external",
"summary": "253488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253488"
},
{
"category": "external",
"summary": "325941",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=325941"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0956.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-bea security update",
"tracking": {
"current_release_date": "2026-01-13T22:34:27+00:00",
"generator": {
"date": "2026-01-13T22:34:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2007:0956",
"initial_release_date": "2007-10-16T07:08:00+00:00",
"revision_history": [
{
"date": "2007-10-16T07:08:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-10-16T03:08:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:34:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-devel@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-demo@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-src@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-jdbc@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-missioncontrol@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"product_id": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea@1.5.0.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"product_id": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-devel@1.5.0.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"product_id": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-demo@1.5.0.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"product_id": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-src@1.5.0.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"product_id": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-jdbc@1.5.0.11-1jpp.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-devel@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-demo@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-src@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-jdbc@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-missioncontrol@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-0243",
"discovery_date": "2007-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "325941"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-jre: GIF buffer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0243"
},
{
"category": "external",
"summary": "RHBZ#325941",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=325941"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0243"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0243",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0243"
}
],
"release_date": "2007-01-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-jre: GIF buffer overflow"
},
{
"cve": "CVE-2007-2788",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250725"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2788"
},
{
"category": "external",
"summary": "RHBZ#250725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250725"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2788"
}
],
"release_date": "2007-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit"
},
{
"cve": "CVE-2007-2789",
"discovery_date": "2007-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250729"
}
],
"notes": [
{
"category": "description",
"text": "The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "BMP image parser vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2789"
},
{
"category": "external",
"summary": "RHBZ#250729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250729"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2789"
}
],
"release_date": "2007-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "BMP image parser vulnerability"
},
{
"cve": "CVE-2007-3503",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-07-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "246765"
}
],
"notes": [
{
"category": "description",
"text": "The Javadoc tool in Sun JDK 6 and JDK 5.0 Update 11 can generate HTML documentation pages that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTML files generated with Javadoc are vulnerable to a XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3503"
},
{
"category": "external",
"summary": "RHBZ#246765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=246765"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3503"
}
],
"release_date": "2007-06-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "HTML files generated with Javadoc are vulnerable to a XSS"
},
{
"cve": "CVE-2007-3698",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "249539"
}
],
"notes": [
{
"category": "description",
"text": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3698"
},
{
"category": "external",
"summary": "RHBZ#249539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698"
}
],
"release_date": "2007-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition"
},
{
"cve": "CVE-2007-4381",
"discovery_date": "2007-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "253488"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the font parsing implementation in Sun JDK and JRE 5.0 Update 9 and earlier, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to perform unauthorized actions via an applet that grants certain privileges to itself.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java: Vulnerability in the font parsing code",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4381"
},
{
"category": "external",
"summary": "RHBZ#253488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253488"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4381",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4381"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4381",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4381"
}
],
"release_date": "2007-08-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "java: Vulnerability in the font parsing code"
}
]
}
RHSA-2007:1086
Vulnerability from csaf_redhat - Published: 2007-12-12 12:27 - Updated: 2026-01-13 22:35Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the font parsing implementation in Sun JDK and JRE 5.0 Update 9 and earlier, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to perform unauthorized actions via an applet that grants certain privileges to itself.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.4.2-bea packages that correct several security issues and\nadd enhancements are now available for Red Hat Enterprise Linux 4 Extras.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The BEA WebLogic JRockit 1.4.2_15 JRE and SDK contain BEA WebLogic JRockit\nVirtual Machine 1.4.2_15 and are certified for the Java 2 Platform,\nStandard Edition, v1.4.2. \n\nA buffer overflow in the Java Runtime Environment image handling code was\nfound. If an attacker is able to cause a server application to process a\nspecially crafted image file, it may be possible to execute arbitrary code\nas the user running the Java Virtual Machine. (CVE-2007-2788,\nCVE-2007-2789, CVE-2007-3004)\n\nA denial of service flaw was discovered in the Java Applet Viewer. An\nuntrusted Java applet could cause the Java Virtual Machine to become\nunresponsive. Please note that the BEA WebLogic JRockit 1.4.2_15 does not\nship with a browser plug-in and therefore this issue could only be\ntriggered by a user running the \"appletviewer\" application. (CVE-2007-3005) \n\nA denial of service flaw was found in the way the JSSE component processed\nSSL/TLS handshake requests. A remote attacker able to connect to a JSSE\nenabled service could send a specially crafted handshake which would cause\nthe Java Runtime Environment to stop responding to future requests.\n(CVE-2007-3698) \n\nA flaw was found in the way the Java Runtime Environment processes font\ndata. An applet viewed via the \"appletviewer\" application could elevate\nits privileges, allowing the applet to perform actions with the same\npermissions as the user running the \"appletviewer\" application. It may also\nbe possible to crash a server application which processes untrusted font\ninformation from a third party. (CVE-2007-4381)\n\nAll users of java-1.4.2-bea should upgrade to these updated packages, which\ncontain the BEA WebLogic JRockit 1.4.2_15 release that resolves these\nissues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:1086",
"url": "https://access.redhat.com/errata/RHSA-2007:1086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://dev2dev.bea.com/pub/advisory/249",
"url": "http://dev2dev.bea.com/pub/advisory/249"
},
{
"category": "external",
"summary": "http://dev2dev.bea.com/pub/advisory/248",
"url": "http://dev2dev.bea.com/pub/advisory/248"
},
{
"category": "external",
"summary": "242595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242595"
},
{
"category": "external",
"summary": "249539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539"
},
{
"category": "external",
"summary": "250725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250725"
},
{
"category": "external",
"summary": "250729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250729"
},
{
"category": "external",
"summary": "250733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250733"
},
{
"category": "external",
"summary": "253488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253488"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1086.json"
}
],
"title": "Red Hat Security Advisory: java-1.4.2-bea security update",
"tracking": {
"current_release_date": "2026-01-13T22:35:29+00:00",
"generator": {
"date": "2026-01-13T22:35:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2007:1086",
"initial_release_date": "2007-12-12T12:27:00+00:00",
"revision_history": [
{
"date": "2007-12-12T12:27:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-12-12T07:27:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:35:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"product": {
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"product_id": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-bea-devel@1.4.2.15-1jpp.2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"product": {
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"product_id": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-bea-jdbc@1.4.2.15-1jpp.2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"product": {
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"product_id": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-bea@1.4.2.15-1jpp.2.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"product": {
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"product_id": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-bea-devel@1.4.2.15-1jpp.2.el4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"product": {
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"product_id": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-bea@1.4.2.15-1jpp.2.el4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"product": {
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"product_id": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-bea-jdbc@1.4.2.15-1jpp.2.el4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686"
},
"product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
},
"product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-2788",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250725"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2788"
},
{
"category": "external",
"summary": "RHBZ#250725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250725"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2788"
}
],
"release_date": "2007-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-12-12T12:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:1086"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit"
},
{
"cve": "CVE-2007-2789",
"discovery_date": "2007-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250729"
}
],
"notes": [
{
"category": "description",
"text": "The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "BMP image parser vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2789"
},
{
"category": "external",
"summary": "RHBZ#250729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250729"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2789"
}
],
"release_date": "2007-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-12-12T12:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:1086"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "BMP image parser vulnerability"
},
{
"cve": "CVE-2007-3698",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "249539"
}
],
"notes": [
{
"category": "description",
"text": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3698"
},
{
"category": "external",
"summary": "RHBZ#249539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698"
}
],
"release_date": "2007-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-12-12T12:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:1086"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition"
},
{
"cve": "CVE-2007-4381",
"discovery_date": "2007-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "253488"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the font parsing implementation in Sun JDK and JRE 5.0 Update 9 and earlier, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to perform unauthorized actions via an applet that grants certain privileges to itself.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java: Vulnerability in the font parsing code",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4381"
},
{
"category": "external",
"summary": "RHBZ#253488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253488"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4381",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4381"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4381",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4381"
}
],
"release_date": "2007-08-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-12-12T12:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686",
"4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:1086"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "java: Vulnerability in the font parsing code"
}
]
}
RHSA-2007_0818
Vulnerability from csaf_redhat - Published: 2007-08-06 15:55 - Updated: 2024-11-14 10:05The Javadoc tool in Sun JDK 6 and JDK 5.0 Update 11 can generate HTML documentation pages that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
Stack-based buffer overflow in javaws.exe in Sun Java Web Start in JRE 5.0 Update 11 and earlier, and 6.0 Update 1 and earlier, allows remote attackers to execute arbitrary code via a long codebase attribute in a JNLP file.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the Java Runtime Environment (JRE) Applet Class Loader in Sun JDK and JRE 5.0 Update 11 and earlier, 6 through 6 Update 1, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to violate the security model for an applet's outbound connections by connecting to certain localhost services running on the machine that loaded the applet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-sun packages that correct several security issues are\navailable for Red Hat Enterprise Linux 4 Extras.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Java Runtime Environment (JRE) contains the software and tools\nthat users need to run applets and applications written using the Java\nprogramming language.\n\nThe Javadoc tool was able to generate HTML documentation pages that\ncontained cross-site scripting (XSS) vulnerabilities. A remote attacker\ncould use this to inject arbitrary web script or HTML. (CVE-2007-3503)\n\nThe Java Web Start URL parsing component contained a buffer overflow\nvulnerability within the parsing code for JNLP files. A remote attacker\ncould create a malicious JNLP file that could trigger this flaw and execute\narbitrary code when opened. (CVE-2007-3655)\n\nThe JSSE component did not correctly process SSL/TLS handshake requests. A\nremote attacker who is able to connect to a JSSE-based service could\ntrigger this flaw leading to a denial-of-service. (CVE-2007-3698)\n\nA flaw was found in the applet class loader. An untrusted applet could use\nthis flaw to circumvent network access restrictions, possibly connecting to\nservices hosted on the machine that executed the applet. (CVE-2007-3922)\n\nAll users of java-sun-1.5.0 should upgrade to these packages, which contain\nSun Java 1.5.0 Update 12 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0818",
"url": "https://access.redhat.com/errata/RHSA-2007:0818"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "246765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=246765"
},
{
"category": "external",
"summary": "248864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248864"
},
{
"category": "external",
"summary": "249533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249533"
},
{
"category": "external",
"summary": "249539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0818.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-sun security update",
"tracking": {
"current_release_date": "2024-11-14T10:05:21+00:00",
"generator": {
"date": "2024-11-14T10:05:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2007:0818",
"initial_release_date": "2007-08-06T15:55:00+00:00",
"revision_history": [
{
"date": "2007-08-06T15:55:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-08-06T11:55:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:05:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_id": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.12-1jpp.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_id": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.12-1jpp.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.12-1jpp.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.12-1jpp.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.12-1jpp.2.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-plugin@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.12-1jpp.2.el4?arch=i586"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3503",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-07-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "246765"
}
],
"notes": [
{
"category": "description",
"text": "The Javadoc tool in Sun JDK 6 and JDK 5.0 Update 11 can generate HTML documentation pages that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTML files generated with Javadoc are vulnerable to a XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3503"
},
{
"category": "external",
"summary": "RHBZ#246765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=246765"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3503"
}
],
"release_date": "2007-06-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-06T15:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0818"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "HTML files generated with Javadoc are vulnerable to a XSS"
},
{
"cve": "CVE-2007-3655",
"discovery_date": "2007-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "248864"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in javaws.exe in Sun Java Web Start in JRE 5.0 Update 11 and earlier, and 6.0 Update 1 and earlier, allows remote attackers to execute arbitrary code via a long codebase attribute in a JNLP file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "A buffer overflow vulnerability in Java Web Start URL parsing code",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3655"
},
{
"category": "external",
"summary": "RHBZ#248864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248864"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3655"
}
],
"release_date": "2007-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-06T15:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0818"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "A buffer overflow vulnerability in Java Web Start URL parsing code"
},
{
"cve": "CVE-2007-3698",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "249539"
}
],
"notes": [
{
"category": "description",
"text": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3698"
},
{
"category": "external",
"summary": "RHBZ#249539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698"
}
],
"release_date": "2007-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-06T15:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0818"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition"
},
{
"cve": "CVE-2007-3922",
"discovery_date": "2007-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "249533"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) Applet Class Loader in Sun JDK and JRE 5.0 Update 11 and earlier, 6 through 6 Update 1, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to violate the security model for an applet\u0027s outbound connections by connecting to certain localhost services running on the machine that loaded the applet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3922"
},
{
"category": "external",
"summary": "RHBZ#249533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3922",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3922"
}
],
"release_date": "2007-07-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-06T15:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.12-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.12-1jpp.2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0818"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions"
}
]
}
RHSA-2007_0956
Vulnerability from csaf_redhat - Published: 2007-10-16 07:08 - Updated: 2024-11-14 10:05Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
The Javadoc tool in Sun JDK 6 and JDK 5.0 Update 11 can generate HTML documentation pages that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the font parsing implementation in Sun JDK and JRE 5.0 Update 9 and earlier, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to perform unauthorized actions via an applet that grants certain privileges to itself.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-bea packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary. \n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The BEA WebLogic JRockit 1.5.0_11 JRE and SDK contain BEA WebLogic JRockit\nVirtual Machine 1.5.0_11 and are certified for the Java 5 Platform,\nStandard Edition, v1.5.0.\n\nA flaw was found in the BEA Java Runtime Environment GIF image handling. \nIf an application processes untrusted GIF image input, it may be possible\nto execute arbitrary code as the user running the Java Virtual Machine. \n(CVE-2007-0243)\n\nA buffer overflow in the Java Runtime Environment image handling code was\nfound. If an attacker is able to cause a server application to process a\nspecially crafted image file, it may be possible to execute arbitrary code\nas the user running the Java Virtual Machine. (CVE-2007-2788,\nCVE-2007-2789, CVE-2007-3004)\n\nA denial of service flaw was discovered in the Java Applet Viewer. An\nuntrusted Java applet could cause the Java Virtual Machine to become\nunresponsive. Please note that the BEA WebLogic JRockit 1.5.0_11 does not\nship with a browser plug-in and therefore this issue could only be\ntriggered by a user running the \"appletviewer\" application. (CVE-2007-3005)\n\nA cross site scripting (XSS) flaw was found in the Javadoc tool. An\nattacker could inject arbitrary content into a Javadoc generated HTML\ndocumentation page, possibly tricking a user or stealing sensitive\ninformation. (CVE-2007-3503)\n\nA denial of service flaw was found in the way the JSSE component processed\nSSL/TLS handshake requests. A remote attacker able to connect to a JSSE\nenabled service could send a specially crafted handshake which would cause\nthe Java Runtime Environment to stop responding to future requests. \n(CVE-2007-3698)\n\nA flaw was found in the way the Java Runtime Environment processes font\ndata. An applet viewed via the \u0027appletviewer\u0027 application could elevate\nits privileges, allowing the applet to perform actions with the same\npermissions as the user running the \"appletviewer\" application. It may also\nbe possible to crash a server application which processes untrusted font\ninformation from a third party. (CVE-2007-4381)\n\nAll users of java-bea-1.5.0 should upgrade to these updated packages, which\ncontain the BEA WebLogic JRockit 1.5.0_11 release that resolves these\nissues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0956",
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "242595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242595"
},
{
"category": "external",
"summary": "246765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=246765"
},
{
"category": "external",
"summary": "249539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539"
},
{
"category": "external",
"summary": "250725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250725"
},
{
"category": "external",
"summary": "250729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250729"
},
{
"category": "external",
"summary": "250733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250733"
},
{
"category": "external",
"summary": "253488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253488"
},
{
"category": "external",
"summary": "325941",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=325941"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0956.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-bea security update",
"tracking": {
"current_release_date": "2024-11-14T10:05:35+00:00",
"generator": {
"date": "2024-11-14T10:05:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2007:0956",
"initial_release_date": "2007-10-16T07:08:00+00:00",
"revision_history": [
{
"date": "2007-10-16T07:08:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-10-16T03:08:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:05:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-devel@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-demo@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-src@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-jdbc@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"product": {
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"product_id": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-missioncontrol@1.5.0.11-1jpp.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"product_id": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea@1.5.0.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"product_id": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-devel@1.5.0.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"product_id": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-demo@1.5.0.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"product_id": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-src@1.5.0.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"product_id": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-jdbc@1.5.0.11-1jpp.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-devel@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-demo@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-src@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-jdbc@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-bea-missioncontrol@1.5.0.11-1jpp.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686"
},
"product_reference": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-0243",
"discovery_date": "2007-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "325941"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-jre: GIF buffer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0243"
},
{
"category": "external",
"summary": "RHBZ#325941",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=325941"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0243"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0243",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0243"
}
],
"release_date": "2007-01-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-jre: GIF buffer overflow"
},
{
"cve": "CVE-2007-2788",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250725"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2788"
},
{
"category": "external",
"summary": "RHBZ#250725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250725"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2788"
}
],
"release_date": "2007-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit"
},
{
"cve": "CVE-2007-2789",
"discovery_date": "2007-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250729"
}
],
"notes": [
{
"category": "description",
"text": "The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "BMP image parser vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2789"
},
{
"category": "external",
"summary": "RHBZ#250729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250729"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2789"
}
],
"release_date": "2007-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "BMP image parser vulnerability"
},
{
"cve": "CVE-2007-3503",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-07-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "246765"
}
],
"notes": [
{
"category": "description",
"text": "The Javadoc tool in Sun JDK 6 and JDK 5.0 Update 11 can generate HTML documentation pages that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTML files generated with Javadoc are vulnerable to a XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3503"
},
{
"category": "external",
"summary": "RHBZ#246765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=246765"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3503"
}
],
"release_date": "2007-06-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "HTML files generated with Javadoc are vulnerable to a XSS"
},
{
"cve": "CVE-2007-3698",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "249539"
}
],
"notes": [
{
"category": "description",
"text": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3698"
},
{
"category": "external",
"summary": "RHBZ#249539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698"
}
],
"release_date": "2007-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition"
},
{
"cve": "CVE-2007-4381",
"discovery_date": "2007-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "253488"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the font parsing implementation in Sun JDK and JRE 5.0 Update 9 and earlier, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to perform unauthorized actions via an applet that grants certain privileges to itself.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java: Vulnerability in the font parsing code",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4381"
},
{
"category": "external",
"summary": "RHBZ#253488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253488"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4381",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4381"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4381",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4381"
}
],
"release_date": "2007-08-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-16T07:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-demo-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-devel-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-jdbc-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-missioncontrol-0:1.5.0.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.i686",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.5.0-bea-src-0:1.5.0.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0956"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "java: Vulnerability in the font parsing code"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.