CVE-2012-0500
Published Feb 15, 2012
Last updated 3 years ago
Overview
- Description
- Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
- Source
- secalert_us@oracle.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Evaluator
- Comment
- -
- Impact
- Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html 'Applies to client deployments of Java. This vulnerability can be exploited only through Untrusted Java Web Start applications and Untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)'
- Solution
- Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html 'Applies to client deployments of Java. This vulnerability can be exploited only through Untrusted Java Web Start applications and Untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)'
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:jre:*:update30:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0581CE53-6C50-47F8-ACFD-4FD8C242D56F", "versionEndIncluding": "1.6.0" }, { "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF13B96D-1F80-4672-8DA3-F86F6D3BF070" }, { "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1A2D440-D966-41A6-955D-38B28DDE0FDB" }, { "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1C57774-AD93-4162-8E45-92B09139C808" }, { "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD7C4194-D34A-418F-9B00-5C6012844AAE" }, { "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99" }, { "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0B82FB1-0F0E-44F9-87AE-628517279E4D" }, { "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBCD143C-057D-4F42-B487-46801E14ACF7" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49260B94-05DE-4B78-9068-6F5F6BFDD19E" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4FDE9EB-08FE-436E-A265-30E83B15DB23" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B08C075B-9FC0-4381-A9E4-FFF0362BD308" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F587E635-3A15-4186-B6A1-F99BE0A56820" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:jre:*:update2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73C38D79-C2B5-45D7-857C-64CBB7888D18", "versionEndIncluding": "1.7.0" }, { "criteria": "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C27372B-A091-46D5-AE39-A44BBB1D9EE2" }, { "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4B153FD-E20B-4909-8B10-884E48F5B590" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "601C3C3F-F4D1-4D26-AAB9-204748F14EF3", "versionEndIncluding": "2.0.2" }, { "criteria": "cpe:2.3:a:oracle:javafx:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "855EE6EA-E83A-44ED-9B55-5443DC43C09C" }, { "criteria": "cpe:2.3:a:oracle:javafx:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F2D2905-5599-4981-AA20-76D7BB94D321" }, { "criteria": "cpe:2.3:a:oracle:javafx:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88A002E2-FE19-48E3-B899-1DA0B04A44D6" }, { "criteria": "cpe:2.3:a:oracle:javafx:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FC888EE-3C31-403A-B91B-1F7502900AF1" }, { "criteria": "cpe:2.3:a:oracle:javafx:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC21B373-8BE0-4D00-B2C0-9F600C718380" }, { "criteria": "cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64BDB79F-96E0-43A4-81CD-BADF0B039006" } ], "operator": "OR" } ] } ]