CVE-2015-4749
Published Jul 16, 2015
Last updated 3 years ago
Overview
- Description
- Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.
- Source
- secalert_us@oracle.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Evaluator
- Comment
- Per Advisory: <a href="http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html">Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.</a>
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:jrockit:r28.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "228C7B8D-18EE-444A-8067-6C222844FB8C" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update95:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2755C397-75DF-4110-8C8A-05EFDFFF9BC1" }, { "criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update75:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D084DBE9-BF2F-4A9B-8FDE-A9A608E6B40F" }, { "criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update80:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18FB6138-2B3D-4C4B-8647-3D1646165641" }, { "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update_33:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49B3533A-57B1-4EDA-9434-D75AE837F2C7" }, { "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update45:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "914D54AC-EAAE-4A01-BA88-7F245BDA47C5" }, { "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update_95:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33DD9C2A-9C6E-407B-8110-2EC7906DE036" }, { "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update_75:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88FA3ACA-B2FC-4D9C-B67E-35272514FB84" }, { "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update_80:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17B87292-EDBB-4D5A-8874-7405F040FAA6" }, { "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update_33:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "366E2702-633C-4D4C-ACF8-4CBEC66719F1" }, { "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update_45:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CFE55B4-9A07-4E88-98AC-8345243AEF79" } ], "operator": "OR" } ] } ]