CVE-2007-3698
Published Jul 11, 2007
Last updated 6 years ago
Overview
- Description
- The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AADA633-EB11-49A0-8E40-66589034F03E" }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19DC29C5-1B9F-46DF-ACF6-3FF93E45777D" }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC0ABF7A-107B-4B97-9BD7-7B0CEDAAF359" }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5DA4242-30D9-44C8-9D0D-877348FFA22B" }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C61C6043-99D0-4F36-AF84-1A5F90B895EE" }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD30DAEB-4893-41CF-A455-B69C463B9337" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8" }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B" }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9919D091-73D7-465A-80FF-F37D6CAF9F46" }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB" }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBE909DE-E55A-4BD3-A5BF-ADE407432193" }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DAC04D2-68FD-4793-A8E7-4690A543D7D4" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A" } ], "operator": "OR" } ] } ]