4
CVSSv2

CVE-2007-5232

Published: 05/10/2007 Updated: 30/10/2018
CVSS v2 Base Score: 4 | Impact Score: 4.9 | Exploitability Score: 4.9
VMScore: 356
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N

Vulnerability Summary

Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and previous versions, JDK and JRE 5.0 Update 12 and previous versions, SDK and JRE 1.4.2_15 and previous versions, and SDK and JRE 1.3.1_20 and previous versions, when applet caching is enabled, allows remote malicious users to violate the security model for an applet's outbound connections via a DNS rebinding attack.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jre 1.3.1

sun sdk 1.4.2

sun sdk 1.3.1 19

sun sdk 1.4.2 10

sun sdk 1.4.2 12

sun jdk 1.5.0

sun jre 1.4.1

sun jre 1.5.0

sun sdk 1.4.2 14

sun jre 1.6.0

sun jre 1.4.2 15

sun jre 1.4.2 13

sun jre 1.4.2 1

sun sdk 1.4.2 13

sun jre 1.4.2 8

sun jre 1.4.2 12

sun jre 1.3.0

sun jdk 1.6.0

sun sdk 1.3.1 20

sun sdk 1.3.1 18

sun sdk 1.3.1 01

sun jre 1.4.2 14

sun sdk 1.3.1 16

sun sdk 1.3.1 01a

sun jre 1.4.2 10

sun sdk 1.4.2 09

sun jre 1.4

sun jre 1.4.2 9

sun jre 1.4.2

sun sdk 1.4.2 11

sun jre 1.4.2 11

sun sdk 1.4.2 08

sun sdk 1.4.2 03

sun jre 1.4.2 3

sun sdk 1.4.2 15

References

NVD-CWE-Otherhttp://conference.hitb.org/hitbsecconf2007kl/?page_id=148http://conference.hitb.org/hitbsecconf2007kl/materials/D2T1%20-%20Billy%20Rios%20-%20Slipping%20Past%20the%20Firewall.pdfhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103079-1http://www.securitytracker.com/id?1018768http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0963.htmlhttp://www.redhat.com/support/errata/RHSA-2007-1041.htmlhttp://www.novell.com/linux/security/advisories/2007_55_java.htmlhttp://www.kb.cert.org/vuls/id/336105http://www.securityfocus.com/bid/25918http://secunia.com/advisories/27206http://secunia.com/advisories/27261http://secunia.com/advisories/27716http://secunia.com/advisories/27693http://secunia.com/advisories/27804http://docs.info.apple.com/article.html?artnum=307177http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.htmlhttp://secunia.com/advisories/28115http://secunia.com/advisories/28777http://dev2dev.bea.com/pub/advisory/272http://www.redhat.com/support/errata/RHSA-2008-0132.htmlhttp://secunia.com/advisories/28880http://secunia.com/advisories/29042http://www.redhat.com/support/errata/RHSA-2008-0156.htmlhttp://secunia.com/advisories/29214http://www.redhat.com/support/errata/RHSA-2008-0100.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-201519-1http://secunia.com/advisories/29340http://www.gentoo.org/security/en/glsa/glsa-200804-20.xmlhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.htmlhttp://secunia.com/advisories/29858http://security.gentoo.org/glsa/glsa-200804-28.xmlhttp://secunia.com/advisories/29897http://www.vmware.com/security/advisories/VMSA-2008-0010.htmlhttp://secunia.com/advisories/30780http://www.gentoo.org/security/en/glsa/glsa-200806-11.xmlhttp://secunia.com/advisories/30676http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533http://www.vupen.com/english/advisories/2008/0609http://www.vupen.com/english/advisories/2008/1856/referenceshttp://www.vupen.com/english/advisories/2007/3895http://www.vupen.com/english/advisories/2007/4224https://exchange.xforce.ibmcloud.com/vulnerabilities/36941https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9331http://www.securityfocus.com/archive/1/482926/100/0/threadedhttps://nvd.nist.gov