7.5
CVSSv2

CVE-2012-0503

Published: 15/02/2012 Updated: 13/05/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and previous versions, 6 Update 30 and previous versions, 5.0 Update 33 and previous versions, and 1.4.2_35 and previous versions allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sun jre 1.4.2_26

sun jre 1.4.2_7

sun jre 1.4.2_27

sun jre 1.4.2_16

sun jre 1.4.2_24

sun jre 1.4.2_4

sun jre

sun jre 1.4.2_2

sun jre 1.4.2_19

sun jre 1.4.2_25

sun jre 1.4.2_13

sun jre 1.4.2_10

sun jre 1.4.2_31

sun jre 1.4.2_21

sun jre 1.4.2_11

sun jre 1.4.2_18

sun jre 1.4.2_30

sun jre 1.4.2_9

sun jre 1.4.2_22

sun jre 1.4.2_14

sun jre 1.4.2_8

sun jre 1.4.2_17

sun jre 1.4.2_29

sun jre 1.4.2

sun jre 1.4.2_28

sun jre 1.4.2_12

sun jre 1.4.2_15

sun jre 1.4.2_1

sun jre 1.4.2_23

sun jre 1.4.2_32

sun jre 1.4.2_6

sun jre 1.4.2_5

sun jre 1.4.2_20

sun jre 1.4.2_34

sun jre 1.4.2_3

sun jre 1.4.2_33

sun jre 1.5.0

sun jre 1.6.0

oracle jre 1.6.0

oracle jre

oracle jre 1.7.0

Vendor Advisories

Multiple vulnerabilities in OpenJDK 6 for the ARM architecture have been fixed ...
Multiple OpenJDK 6 vulnerabilities have been fixed ...
Synopsis Moderate: java-142-ibm-sap security update Type/Severity Security Advisory: Moderate Topic Updated java-142-ibm-sap packages that fix several security issues arenow available for Red Hat Enterprise Linux 5 and 6 for SAPThe Red Hat Security Response Team has rated this update as having moderate ...
Synopsis Critical: java-142-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-142-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 5 SupplementaryThe Red Hat Security Response Team has rated this update as having criticalsecurity ...
Synopsis Critical: java-160-sun security update Type/Severity Security Advisory: Critical Topic Updated java-160-sun packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 Extras, and Red Hat EnterpriseLinux 5 and 6 SupplementaryThe Red Hat Security Response Team has ...
Synopsis Critical: java-160-openjdk security update Type/Severity Security Advisory: Critical Topic Updated java-160-openjdk packages that fix several security issues arenow available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having criticalsecurity impac ...
Synopsis Critical: java-160-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 5 and 6 SupplementaryThe Red Hat Security Response Team has rated this update as having criticalse ...
Synopsis Important: java-160-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-160-openjdk packages that fix several security issues arenow available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security im ...
Synopsis Low: Red Hat Network Satellite server IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Network Satellite Server 54The Red Hat Security Response Team has rated this update as ha ...
It was discovered that Java2D did not properly check graphics rendering objects before passing them to the native renderer Malicious input, or an untrusted Java application or applet could use this flaw to crash the Java Virtual Machine (JVM), or bypass Java sandbox restrictions (CVE-2012-0497) It was discovered that the exception thrown on deser ...

References

NVD-CWE-noinfohttp://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.htmlhttp://secunia.com/advisories/48589http://secunia.com/advisories/49198http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00015.htmlhttp://secunia.com/advisories/48692http://secunia.com/advisories/48948http://secunia.com/advisories/48950http://secunia.com/advisories/48915http://rhn.redhat.com/errata/RHSA-2013-1455.htmlhttp://www.debian.org/security/2012/dsa-2420http://security.gentoo.org/glsa/glsa-201406-32.xmlhttp://marc.info/?l=bugtraq&m=134254957702612&w=2http://marc.info/?l=bugtraq&m=133728004526190&w=2http://marc.info/?l=bugtraq&m=133365109612558&w=2http://marc.info/?l=bugtraq&m=133364885411663&w=2http://marc.info/?l=bugtraq&m=133847939902305&w=2http://www.securityfocus.com/bid/52018https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14813http://rhn.redhat.com/errata/RHSA-2012-1080.htmlhttp://marc.info/?l=bugtraq&m=134254866602253&w=2http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00007.htmlhttp://rhn.redhat.com/errata/RHSA-2012-0702.htmlhttp://rhn.redhat.com/errata/RHSA-2012-0514.htmlhttp://rhn.redhat.com/errata/RHSA-2012-0508.htmlhttp://lists.opensuse.org/opensuse-security-announce/2012-06/msg00009.htmlhttp://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.htmlhttp://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.htmlhttp://secunia.com/advisories/48073http://secunia.com/advisories/48074https://nvd.nist.govhttps://usn.ubuntu.com/1373-2/