6.4
CVSSv2

CVE-2011-3563

Published: 15/02/2012 Updated: 13/05/2022
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and previous versions, 6 Update 30 and previous versions, 5.0 Update 33 and previous versions, and 1.4.2_35 and previous versions allows remote malicious users to affect confidentiality and availability via unknown vectors related to Sound.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jre 1.4.2 26

sun jre 1.4.2 7

sun jre 1.4.2 27

sun jre 1.4.2 16

sun jre 1.4.2 24

sun jre 1.4.2 4

sun jre

sun jre 1.4.2 2

sun jre 1.4.2 19

sun jre 1.4.2 25

sun jre 1.4.2 15

sun jre 1.4.2 13

sun jre 1.4.2 1

sun jre 1.4.2 8

sun jre 1.4.2 31

sun jre 1.4.2 29

sun jre 1.4.2 12

sun jre 1.4.2 18

sun jre 1.4.2 22

sun jre 1.4.2 28

sun jre 1.4.2 14

sun jre 1.4.2 30

sun jre 1.4.2 10

sun jre 1.4.2 17

sun jre 1.4.2 9

sun jre 1.4.2

sun jre 1.4.2 21

sun jre 1.4.2 32

sun jre 1.4.2 11

sun jre 1.4.2 23

sun jre 1.4.2 3

sun jre 1.4.2 20

sun jre 1.4.2 33

sun jre 1.4.2 5

sun jre 1.4.2 34

sun jre 1.4.2 6

sun jre 1.5.0

sun jre 1.6.0

oracle jre 1.6.0

oracle jre

oracle jre 1.7.0

Vendor Advisories

Multiple vulnerabilities in OpenJDK 6 for the ARM architecture have been fixed ...
Multiple OpenJDK 6 vulnerabilities have been fixed ...
Synopsis Critical: java-142-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-142-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 5 SupplementaryThe Red Hat Security Response Team has rated this update as having criticalsecurity ...
Synopsis Critical: java-160-sun security update Type/Severity Security Advisory: Critical Topic Updated java-160-sun packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 Extras, and Red Hat EnterpriseLinux 5 and 6 SupplementaryThe Red Hat Security Response Team has ...
Synopsis Critical: java-160-openjdk security update Type/Severity Security Advisory: Critical Topic Updated java-160-openjdk packages that fix several security issues arenow available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having criticalsecurity impac ...
Synopsis Moderate: java-142-ibm-sap security update Type/Severity Security Advisory: Moderate Topic Updated java-142-ibm-sap packages that fix several security issues arenow available for Red Hat Enterprise Linux 5 and 6 for SAPThe Red Hat Security Response Team has rated this update as having moderate ...
Synopsis Critical: java-160-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 5 and 6 SupplementaryThe Red Hat Security Response Team has rated this update as having criticalse ...
Synopsis Important: java-160-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-160-openjdk packages that fix several security issues arenow available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security im ...
Synopsis Low: Red Hat Network Satellite server IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Network Satellite Server 54The Red Hat Security Response Team has rated this update as ha ...
It was discovered that Java2D did not properly check graphics rendering objects before passing them to the native renderer Malicious input, or an untrusted Java application or applet could use this flaw to crash the Java Virtual Machine (JVM), or bypass Java sandbox restrictions (CVE-2012-0497) It was discovered that the exception thrown on deser ...

References

NVD-CWE-noinfohttp://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.htmlhttp://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.htmlhttp://secunia.com/advisories/48589http://secunia.com/advisories/49198http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00015.htmlhttp://secunia.com/advisories/48692http://secunia.com/advisories/48948http://secunia.com/advisories/48950http://secunia.com/advisories/48915http://www.mandriva.com/security/advisories?name=MDVSA-2013:150http://rhn.redhat.com/errata/RHSA-2013-1455.htmlhttp://www.debian.org/security/2012/dsa-2420http://security.gentoo.org/glsa/glsa-201406-32.xmlhttp://marc.info/?l=bugtraq&m=134254957702612&w=2http://marc.info/?l=bugtraq&m=133728004526190&w=2http://marc.info/?l=bugtraq&m=133365109612558&w=2http://marc.info/?l=bugtraq&m=133364885411663&w=2http://marc.info/?l=bugtraq&m=133847939902305&w=2http://www.securityfocus.com/bid/52012https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14942http://rhn.redhat.com/errata/RHSA-2012-1080.htmlhttp://marc.info/?l=bugtraq&m=134254866602253&w=2http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00007.htmlhttp://rhn.redhat.com/errata/RHSA-2012-0702.htmlhttp://rhn.redhat.com/errata/RHSA-2012-0514.htmlhttp://rhn.redhat.com/errata/RHSA-2012-0508.htmlhttp://lists.opensuse.org/opensuse-security-announce/2012-06/msg00009.htmlhttp://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.htmlhttp://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.htmlhttp://secunia.com/advisories/48073http://secunia.com/advisories/48074https://nvd.nist.govhttps://usn.ubuntu.com/1373-2/