4.3
CVSSv2

CVE-2016-3426

Published: 21/04/2016 Updated: 13/05/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.1 | Impact Score: 1.4 | Exploitability Score: 1.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote malicious users to affect confidentiality via vectors related to JCE.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle jdk 1.8.0

oracle jre 1.8.0

Vendor Advisories

Synopsis Moderate: java-171-ibm security update Type/Severity Security Advisory: Moderate Topic An update for java-171-ibm is now available for Red HatSatellite 57 and Red Hat Satellite 56Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Sc ...
Several security issues were fixed in OpenJDK 8 ...
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in breakouts of the Java sandbox, denial of service or information disclosure For the stable distribution (jessie), these problems have been fixed in version 7u101-266-1~deb8u1 We recommend that you upgrade your openjdk-7 packages ...
It was discovered that the ObjectInputStream class in the Serialization component of OpenJDK failed to properly ensure thread consistency when deserializing serialized input An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions (CVE-2016-0686) It was discovered that the Hotspot component of OpenJDK did no ...
It was discovered that the GCM (Galois/Counter Mode) implementation in the JCE component in OpenJDK used a non-constant time comparison when comparing GCM authentication tags A remote attacker could possibly use this flaw to determine the value of the authentication tag ...

References

NVD-CWE-noinfohttp://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0702.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0701.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0708.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0716.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlhttps://access.redhat.com/errata/RHSA-2016:1430http://www.securityfocus.com/bid/86449http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.htmlhttp://rhn.redhat.com/errata/RHSA-2016-1039.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.htmlhttp://www.ubuntu.com/usn/USN-2963-1http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0677.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0651.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0650.htmlhttp://www.debian.org/security/2016/dsa-3558http://www.securitytracker.com/id/1035596https://security.gentoo.org/glsa/201610-08https://security.netapp.com/advisory/ntap-20160420-0001/https://access.redhat.com/errata/RHSA-2017:1216https://access.redhat.com/errata/RHSA-2017:1216https://nvd.nist.govhttps://usn.ubuntu.com/2963-1/