Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2007-3698

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-11 Jul, 2007 | 22:00
Updated At-07 Aug, 2024 | 14:28
Rejected At-
Credits

The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:11 Jul, 2007 | 22:00
Updated At:07 Aug, 2024 | 14:28
Rejected At:
▼CVE Numbering Authority (CNA)

The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.redhat.com/support/errata/RHSA-2008-0132.html
vendor-advisory
x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2007-0818.html
vendor-advisory
x_refsource_REDHAT
http://www.vupen.com/english/advisories/2007/2660
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/26933
third-party-advisory
x_refsource_SECUNIA
http://docs.info.apple.com/article.html?artnum=307177
x_refsource_MISC
http://www.securityfocus.com/bid/24846
vdb-entry
x_refsource_BID
http://secunia.com/advisories/26314
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634
vdb-entry
signature
x_refsource_OVAL
http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
x_refsource_CONFIRM
http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html
vendor-advisory
x_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilities/35333
vdb-entry
x_refsource_XF
http://secunia.com/advisories/29897
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/26015
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/28056
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
vendor-advisory
x_refsource_APPLE
http://www.redhat.com/support/errata/RHSA-2008-0100.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/26221
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
vendor-advisory
x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2007-0956.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/26645
third-party-advisory
x_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/28777
third-party-advisory
x_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450
vendor-advisory
x_refsource_HP
http://www.securitytracker.com/id?1018357
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2007/4224
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/3861
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/3009
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1
vendor-advisory
x_refsource_SUNALERT
http://secunia.com/advisories/28880
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/27716
third-party-advisory
x_refsource_SECUNIA
http://osvdb.org/36663
vdb-entry
x_refsource_OSVDB
http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/28115
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/29340
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2495
vdb-entry
x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2007-1086.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/27203
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/26631
third-party-advisory
x_refsource_SECUNIA
http://dev2dev.bea.com/pub/advisory/249
vendor-advisory
x_refsource_BEA
http://secunia.com/advisories/27635
third-party-advisory
x_refsource_SECUNIA
http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml
x_refsource_CONFIRM
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0132.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0818.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.vupen.com/english/advisories/2007/2660
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/26933
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://docs.info.apple.com/article.html?artnum=307177
Resource:
x_refsource_MISC
Hyperlink: http://www.securityfocus.com/bid/24846
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/26314
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/35333
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/29897
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/26015
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/28056
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0100.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/26221
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0956.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/26645
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/28777
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securitytracker.com/id?1018357
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2007/4224
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/3861
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/3009
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://secunia.com/advisories/28880
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/27716
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://osvdb.org/36663
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/28115
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/29340
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/2495
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-1086.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/27203
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/26631
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://dev2dev.bea.com/pub/advisory/249
Resource:
vendor-advisory
x_refsource_BEA
Hyperlink: http://secunia.com/advisories/27635
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.redhat.com/support/errata/RHSA-2008-0132.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0818.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.vupen.com/english/advisories/2007/2660
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/26933
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://docs.info.apple.com/article.html?artnum=307177
x_refsource_MISC
x_transferred
http://www.securityfocus.com/bid/24846
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/26314
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
x_refsource_CONFIRM
x_transferred
http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html
vendor-advisory
x_refsource_CISCO
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/35333
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/29897
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/26015
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/28056
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0100.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/26221
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0956.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/26645
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/28777
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450
vendor-advisory
x_refsource_HP
x_transferred
http://www.securitytracker.com/id?1018357
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2007/4224
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/3861
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/3009
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://secunia.com/advisories/28880
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/27716
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://osvdb.org/36663
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/28115
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/29340
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/2495
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-1086.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/27203
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/26631
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://dev2dev.bea.com/pub/advisory/249
vendor-advisory
x_refsource_BEA
x_transferred
http://secunia.com/advisories/27635
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0132.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0818.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2660
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/26933
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=307177
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securityfocus.com/bid/24846
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/26314
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/35333
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/29897
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/26015
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/28056
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0100.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/26221
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0956.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/26645
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/28777
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securitytracker.com/id?1018357
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/4224
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/3861
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/3009
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://secunia.com/advisories/28880
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/27716
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://osvdb.org/36663
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/28115
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/29340
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2495
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-1086.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/27203
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/26631
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://dev2dev.bea.com/pub/advisory/249
Resource:
vendor-advisory
x_refsource_BEA
x_transferred
Hyperlink: http://secunia.com/advisories/27635
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:11 Jul, 2007 | 22:30
Updated At:30 Oct, 2018 | 16:26

The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
Type: Primary
Version: 2.0
Base score: 7.8
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

Sun Microsystems (Oracle Corporation)
sun
>>jdk>>1.5.0
cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jdk>>1.5.0
cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jdk>>1.5.0
cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jdk>>1.5.0
cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jdk>>1.5.0
cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jdk>>1.6.0
cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jre>>1.4.2_11
cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jre>>1.4.2_12
cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jre>>1.4.2_13
cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jre>>1.4.2_14
cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jre>>1.5.0
cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jre>>1.5.0
cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jre>>1.5.0
cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jre>>1.5.0
cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jre>>1.5.0
cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>jre>>1.6.0
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>sdk>>1.4.2_11
cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>sdk>>1.4.2_12
cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>sdk>>1.4.2_13
cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>sdk>>1.4.2_14
cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://dev2dev.bea.com/pub/advisory/249cve@mitre.org
N/A
http://docs.info.apple.com/article.html?artnum=307177cve@mitre.org
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450cve@mitre.org
N/A
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.htmlcve@mitre.org
N/A
http://osvdb.org/36663cve@mitre.org
N/A
http://secunia.com/advisories/26015cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26221cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26314cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26631cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26645cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26933cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27203cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27635cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27716cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28056cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28115cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28777cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28880cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29340cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29897cve@mitre.org
Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1cve@mitre.org
Patch
Vendor Advisory
http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.htmlcve@mitre.org
N/A
http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.htmlcve@mitre.org
Vendor Advisory
http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtmlcve@mitre.org
Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200709-15.xmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2007-0818.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2007-0956.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2007-1086.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2008-0100.htmlcve@mitre.org
Patch
http://www.redhat.com/support/errata/RHSA-2008-0132.htmlcve@mitre.org
Patch
http://www.securityfocus.com/bid/24846cve@mitre.org
Patch
http://www.securitytracker.com/id?1018357cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2007/2495cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2007/2660cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2007/3009cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2007/3861cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2007/4224cve@mitre.org
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/35333cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634cve@mitre.org
N/A
Hyperlink: http://dev2dev.bea.com/pub/advisory/249
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=307177
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01269450
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/36663
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/26015
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/26221
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/26314
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/26631
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/26645
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/26933
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/27203
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/27635
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/27716
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28056
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28115
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28777
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28880
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/29340
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/29897
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.cisco.com/en/US/products/products_security_response09186a008088bd19.html
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0818.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0956.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-1086.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0100.html
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0132.html
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.securityfocus.com/bid/24846
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.securitytracker.com/id?1018357
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2495
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2007/2660
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2007/3009
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2007/3861
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2007/4224
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/35333
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10634
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

61Records found

CVE-2013-2445
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.8||HIGH
EPSS-6.73% / 90.90%
||
7 Day CHG~0.00%
Published-18 Jun, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Hotspot. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "handling of memory allocation errors."

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)Oracle Corporation
Product-jrejdkn/a
CVE-2012-3189
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.8||HIGH
EPSS-0.49% / 64.60%
||
7 Day CHG~0.00%
Published-17 Oct, 2012 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect availability, related to COMSTAR.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-sunosn/a
CVE-2012-3210
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.8||HIGH
EPSS-0.69% / 70.91%
||
7 Day CHG~0.00%
Published-17 Oct, 2012 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect availability via unknown vectors related to Kernel.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-sunosn/a
CVE-2012-3120
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.8||HIGH
EPSS-2.03% / 83.07%
||
7 Day CHG~0.00%
Published-17 Jul, 2012 | 22:39
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Sun Solaris 8 allows remote attackers to affect availability, related to TCP/IP.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-sunosn/a
CVE-2011-3543
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.8||HIGH
EPSS-0.81% / 73.26%
||
7 Day CHG~0.00%
Published-18 Oct, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Solaris 11 Express allows remote attackers to affect availability, related to iSCSI DataMover (IDM).

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-sunosn/a
CVE-2012-0094
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.8||HIGH
EPSS-0.74% / 72.01%
||
7 Day CHG~0.00%
Published-18 Jan, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Solaris 9, 10, and 11 Express allows remote attackers to affect availability, related to TCP/IP.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-sunosn/a
CVE-2009-0277
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.37% / 58.28%
||
7 Day CHG~0.00%
Published-27 Jan, 2009 | 02:00
Updated-07 Aug, 2024 | 04:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the kernel in OpenSolaris snv_100 through snv_102 on the Sun UltraSPARC T2 and T2+ sun4v platforms allows local users to cause a denial of service (panic) via unknown vectors.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-opensolarisultrasparcn/a
CVE-2009-0304
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-14.21% / 94.12%
||
7 Day CHG~0.00%
Published-27 Jan, 2009 | 20:00
Updated-07 Aug, 2024 | 04:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The kernel in Sun Solaris 10 and 11 snv_101b, and OpenSolaris before snv_108, allows remote attackers to cause a denial of service (system crash) via a crafted IPv6 packet, related to an "insufficient validation security vulnerability," as demonstrated by SunOSipv6.c.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-opensolarissolarisn/a
CVE-2008-2090
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.48% / 80.22%
||
7 Day CHG~0.00%
Published-06 May, 2008 | 15:00
Updated-07 Aug, 2024 | 08:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the SCTP protocol implementation in Sun Solaris 10 allows remote attackers to cause a denial of service (CPU consumption and network traffic amplification) via a crafted SCTP packet.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-solarisn/a
CWE ID-CWE-399
Not Available
CVE-2008-0212
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.80% / 73.15%
||
7 Day CHG~0.00%
Published-06 Feb, 2008 | 20:00
Updated-07 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ovtopmd in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allows remote attackers to cause a denial of service (crash) via a crafted TCP request that triggers an out-of-bounds memory access.

Action-Not Available
Vendor-n/aMicrosoft CorporationHP Inc.Sun Microsystems (Oracle Corporation)Linux Kernel Organization, Inc
Product-solarislinux_kernelopenview_network_node_managerhp-uxwindowsn/a
CWE ID-CWE-399
Not Available
CVE-2011-2287
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.8||HIGH
EPSS-0.47% / 63.68%
||
7 Day CHG~0.00%
Published-21 Jul, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows remote attackers to affect availability via unknown vectors related to fingerd.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-sunosn/a
  • Previous
  • 1
  • 2
  • Next
Details not found