ID

VAR-201404-0398


CVE

CVE-2014-0429


TITLE

plural Oracle Java In product 2D Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-002096

DESCRIPTION

Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. (DoS) An attack may be carried out. Java SE (Java Platform Standard Edition) is used to develop and deploy Java applications on desktops, servers, and embedded devices and real-time environments; JRockit is a Java virtual machine built into Oracle Fusion Middleware; Java SE Embedded is a The Java platform for developing powerful, reliable, and portable applications for embedded systems. A remote attacker could exploit this vulnerability to execute arbitrary code, affecting the confidentiality, integrity, and availability of data. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. Bugs fixed (https://bugzilla.redhat.com/): 1031734 - CVE-2013-6629 libjpeg: information leak (read of uninitialized memory) 1045561 - CVE-2013-6954 libpng: unhandled zero-length PLTE chunk or NULL palette 1051519 - CVE-2014-0428 OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767) 1051528 - CVE-2014-0422 OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) 1051699 - CVE-2014-0373 OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) 1051823 - CVE-2013-5878 OpenJDK: null xmlns handling issue (Security, 8025026) 1051911 - CVE-2013-5884 OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) 1051912 - CVE-2014-0416 OpenJDK: insecure subject principals set handling (JAAS, 8024306) 1051923 - CVE-2014-0376 OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) 1052915 - CVE-2013-5907 ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) 1052919 - CVE-2014-0368 OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) 1052942 - CVE-2013-5910 OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) 1053010 - CVE-2014-0411 OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) 1053066 - CVE-2014-0423 OpenJDK: XXE issue in decoder (Beans, 8023245) 1053266 - CVE-2013-5896 OpenJDK: com.sun.corba.se. ============================================================================ Ubuntu Security Notice USN-2191-1 May 01, 2014 openjdk-6 vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Several security issues were fixed in OpenJDK 6. Software Description: - openjdk-6: Open Source Java implementation Details: Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure, data integrity and availability. An attacker could exploit these to cause a denial of service or expose sensitive data over the network. (CVE-2014-0429, CVE-2014-0446, CVE-2014-0451, CVE-2014-0452, CVE-2014-0456, CVE-2014-0457, CVE-2014-0458, CVE-2014-0461, CVE-2014-0462, CVE-2014-2397, CVE-2014-2405, CVE-2014-2412, CVE-2014-2414, CVE-2014-2421, CVE-2014-2423, CVE-2014-2427) Two vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to expose sensitive data over the network. (CVE-2014-0453, CVE-2014-0460) A vulnerability was discovered in the OpenJDK JRE related to availability. An attacker could exploit this to cause a denial of service. (CVE-2014-0459) Jakub Wilk discovered that the OpenJDK JRE incorrectly handled temporary files. In the default installation of Ubuntu, this should be prevented by the Yama link restrictions. (CVE-2014-1876) A vulnerability was discovered in the OpenJDK JRE related to data integrity. (CVE-2014-2398) A vulnerability was discovered in the OpenJDK JRE related to information disclosure. An attacker could exploit this to expose sensitive data over the network. (CVE-2014-2403) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: icedtea-6-jre-cacao 6b31-1.13.3-1ubuntu1~0.12.04.2 icedtea-6-jre-jamvm 6b31-1.13.3-1ubuntu1~0.12.04.2 openjdk-6-jre 6b31-1.13.3-1ubuntu1~0.12.04.2 openjdk-6-jre-headless 6b31-1.13.3-1ubuntu1~0.12.04.2 openjdk-6-jre-lib 6b31-1.13.3-1ubuntu1~0.12.04.2 openjdk-6-jre-zero 6b31-1.13.3-1ubuntu1~0.12.04.2 Ubuntu 10.04 LTS: icedtea-6-jre-cacao 6b31-1.13.3-1ubuntu1~0.10.04.1 openjdk-6-jre 6b31-1.13.3-1ubuntu1~0.10.04.1 openjdk-6-jre-headless 6b31-1.13.3-1ubuntu1~0.10.04.1 openjdk-6-jre-lib 6b31-1.13.3-1ubuntu1~0.10.04.1 openjdk-6-jre-zero 6b31-1.13.3-1ubuntu1~0.10.04.1 This update uses a new upstream release, which includes additional bug fixes. 7) - noarch, x86_64 3. (CVE-2014-1876) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. Note that the CVE-2014-0459 issue is in the lcms2 library, which has been patched to correct this flaw. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFTdfckmqjQ0CJFipgRArKEAKCIiAR2WkLo3Vb0gzzQ5RDz7hQZ3gCcDC6A 5xOtKkhOvonpLXoqBiAcXWQ= =qBk5 -----END PGP SIGNATURE----- . For the stable distribution (wheezy), these problems have been fixed in version 7u55-2.4.7-1~deb7u1. For the unstable distribution (sid), these problems have been fixed in version 7u55-2.4.7-1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.6.0-openjdk security and bug fix update Advisory ID: RHSA-2014:0408-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0408.html Issue date: 2014-04-16 CVE Names: CVE-2014-0429 CVE-2014-0446 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 CVE-2014-2397 CVE-2014-2398 CVE-2014-2403 CVE-2014-2412 CVE-2014-2414 CVE-2014-2421 CVE-2014-2423 CVE-2014-2427 ===================================================================== 1. Summary: Updated java-1.6.0-openjdk packages that fix various security issues and one bug are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Java Software Development Kit. An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. (CVE-2014-0429) Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions. (CVE-2014-0456, CVE-2014-2397, CVE-2014-2421) Multiple improper permission check issues were discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-0457, CVE-2014-0461) Multiple improper permission check issues were discovered in the AWT, JAX-WS, JAXB, Libraries, and Sound components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-2412, CVE-2014-0451, CVE-2014-0458, CVE-2014-2423, CVE-2014-0452, CVE-2014-2414, CVE-2014-0446, CVE-2014-2427) Multiple flaws were identified in the Java Naming and Directory Interface (JNDI) DNS client. These flaws could make it easier for a remote attacker to perform DNS spoofing attacks. (CVE-2014-0460) It was discovered that the JAXP component did not properly prevent access to arbitrary files when a SecurityManager was present. This flaw could cause a Java application using JAXP to leak sensitive information, or affect application availability. (CVE-2014-2403) It was discovered that the Security component in OpenJDK could leak some timing information when performing PKCS#1 unpadding. This could possibly lead to the disclosure of some information that was meant to be protected by encryption. (CVE-2014-0453) It was discovered that the fix for CVE-2013-5797 did not properly resolve input sanitization flaws in javadoc. When javadoc documentation was generated from an untrusted Java source code and hosted on a domain not controlled by the code author, these issues could make it easier to perform cross-site scripting (XSS) attacks. (CVE-2014-2398) An insecure temporary file use flaw was found in the way the unpack200 utility created log files. A local attacker could possibly use this flaw to perform a symbolic link attack and overwrite arbitrary files with the privileges of the user running unpack200. (CVE-2014-1876) This update also fixes the following bug: * The OpenJDK update to IcedTea version 1.13 introduced a regression related to the handling of the jdk_version_info variable. This variable was not properly zeroed out before being passed to the Java Virtual Machine, resulting in a memory leak in the java.lang.ref.Finalizer class. This update fixes this issue, and memory leaks no longer occur. (BZ#1085373) All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) 1085373 - java.lang.ref.Finalizer leak when upgrading from 1.62 to 1.66 1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) 1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766) 1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) 1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) 1087413 - CVE-2014-0456 OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) 1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854) 1087423 - CVE-2014-2397 OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) 1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) 1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010) 1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) 1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) 1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) 1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) 1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) 1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740) 1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) 1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) 1087443 - CVE-2014-2403 OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.i386.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.i386.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0429.html https://www.redhat.com/security/data/cve/CVE-2014-0446.html https://www.redhat.com/security/data/cve/CVE-2014-0451.html https://www.redhat.com/security/data/cve/CVE-2014-0452.html https://www.redhat.com/security/data/cve/CVE-2014-0453.html https://www.redhat.com/security/data/cve/CVE-2014-0456.html https://www.redhat.com/security/data/cve/CVE-2014-0457.html https://www.redhat.com/security/data/cve/CVE-2014-0458.html https://www.redhat.com/security/data/cve/CVE-2014-0460.html https://www.redhat.com/security/data/cve/CVE-2014-0461.html https://www.redhat.com/security/data/cve/CVE-2014-1876.html https://www.redhat.com/security/data/cve/CVE-2014-2397.html https://www.redhat.com/security/data/cve/CVE-2014-2398.html https://www.redhat.com/security/data/cve/CVE-2014-2403.html https://www.redhat.com/security/data/cve/CVE-2014-2412.html https://www.redhat.com/security/data/cve/CVE-2014-2414.html https://www.redhat.com/security/data/cve/CVE-2014-2421.html https://www.redhat.com/security/data/cve/CVE-2014-2423.html https://www.redhat.com/security/data/cve/CVE-2014-2427.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTTm2zXlSAg2UNWIIRAkZ8AJ4tQFSY3KSdfOiDJA5KJWO9IJa1BACeMLJ6 PQHHIgiQ5K7Q4/GEJAHNU94= =9aj6 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.52

sources: NVD: CVE-2014-0429 // JVNDB: JVNDB-2014-002096 // VULHUB: VHN-67922 // PACKETSTORM: 126611 // PACKETSTORM: 126200 // PACKETSTORM: 126201 // PACKETSTORM: 127655 // PACKETSTORM: 126443 // PACKETSTORM: 127041 // PACKETSTORM: 126664 // PACKETSTORM: 126494 // PACKETSTORM: 126183

AFFECTED PRODUCTS

vendor:oraclemodel:jrockitscope:eqversion:r27.8.1

Trust: 1.8

vendor:oraclemodel:jrockitscope:eqversion:r28.3.1

Trust: 1.8

vendor:ibmmodel:forms viewerscope:ltversion:8.0.1.1

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.7.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.6.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.5.0

Trust: 1.0

vendor:ibmmodel:forms viewerscope:gteversion:4.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:6.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.8.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.7.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.10

Trust: 1.0

vendor:ibmmodel:forms viewerscope:gteversion:8.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:13.10

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.8.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.5.0

Trust: 1.0

vendor:junipermodel:junos spacescope:ltversion:15.1

Trust: 1.0

vendor:ibmmodel:forms viewerscope:ltversion:4.0.0.3

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:ibmmodel:dominoscope:lteversion:8.5.3 fix pack 6

Trust: 0.8

vendor:ibmmodel:dominoscope:lteversion:9.0.1 fix pack 1

Trust: 0.8

vendor:ibmmodel:forms viewerscope:eqversion:4.0

Trust: 0.8

vendor:ibmmodel:forms viewerscope:eqversion:8.0

Trust: 0.8

vendor:ibmmodel:forms viewerscope:eqversion:8.0.1

Trust: 0.8

vendor:ibmmodel:infosphere streamsscope:eqversion:1.0

Trust: 0.8

vendor:ibmmodel:infosphere streamsscope:eqversion:2.0

Trust: 0.8

vendor:ibmmodel:infosphere streamsscope:eqversion:3.0

Trust: 0.8

vendor:ibmmodel:infosphere streamsscope:eqversion:3.1

Trust: 0.8

vendor:ibmmodel:infosphere streamsscope:eqversion:3.2

Trust: 0.8

vendor:ibmmodel:lotus expeditorscope:eqversion:6.2.x

Trust: 0.8

vendor:ibmmodel:notesscope:lteversion:8.5.3 fix pack 6

Trust: 0.8

vendor:ibmmodel:notesscope:lteversion:9.0.1 fix pack 1

Trust: 0.8

vendor:oraclemodel:jdkscope:eqversion:5.0 update 61

Trust: 0.8

vendor:oraclemodel:jdkscope:eqversion:6 update 71

Trust: 0.8

vendor:oraclemodel:jdkscope:eqversion:7 update 51

Trust: 0.8

vendor:oraclemodel:jdkscope:eqversion:8

Trust: 0.8

vendor:oraclemodel:jrescope:eqversion:5.0 update 61

Trust: 0.8

vendor:oraclemodel:jrescope:eqversion:6 update 71

Trust: 0.8

vendor:oraclemodel:jrescope:eqversion:7 update 51

Trust: 0.8

vendor:oraclemodel:jrescope:eqversion:8

Trust: 0.8

vendor:oraclemodel:java sescope:eqversion:embedded 7 update 51

Trust: 0.8

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application server standardscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application server version 5scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus clientscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developer light version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer professional version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer standard version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer version 5scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer's kit for javascope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus primary serverscope:eqversion:base

Trust: 0.8

vendor:hitachimodel:cosminexus studioscope:eqversion:version 5

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:-r

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:express

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:light

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:standard-r

Trust: 0.8

vendor:hitachimodel:ucosminexus application server enterprisescope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application server smart editionscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application server standardscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus clientscope:eqversion:none

Trust: 0.8

vendor:hitachimodel:ucosminexus clientscope:eqversion:for plug-in

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:01

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional for plug-in

Trust: 0.8

vendor:hitachimodel:ucosminexus developer lightscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developer standardscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus operatorscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus primary serverscope:eqversion:base

Trust: 0.8

vendor:hitachimodel:ucosminexus serverscope:eqversion:standard-r

Trust: 0.8

vendor:hitachimodel:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope:eqversion:none

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope:eqversion:- messaging

Trust: 0.8

sources: JVNDB: JVNDB-2014-002096 // NVD: CVE-2014-0429

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0429
value: HIGH

Trust: 1.0

NVD: CVE-2014-0429
value: HIGH

Trust: 0.8

VULHUB: VHN-67922
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-0429
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-67922
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-67922 // JVNDB: JVNDB-2014-002096 // NVD: CVE-2014-0429

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2014-0429

THREAT TYPE

remote

Trust: 0.3

sources: PACKETSTORM: 127041 // PACKETSTORM: 126664 // PACKETSTORM: 126183

TYPE

arbitrary

Trust: 0.3

sources: PACKETSTORM: 127041 // PACKETSTORM: 126664 // PACKETSTORM: 126183

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002096

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-67922

PATCH

title:HS14-009url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-009/index.html

Trust: 0.8

title:1672080url:http://www-01.ibm.com/support/docview.wss?uid=swg21672080

Trust: 0.8

title:1676746url:http://www-01.ibm.com/support/docview.wss?uid=swg21676746

Trust: 0.8

title:1675973url:http://www-01.ibm.com/support/docview.wss?uid=swg21675973

Trust: 0.8

title:1677900url:http://www-01.ibm.com/support/docview.wss?uid=swg21677900

Trust: 0.8

title:1677894url:http://www-01.ibm.com/support/docview.wss?uid=swg21677894

Trust: 0.8

title:1682828url:http://www-01.ibm.com/support/docview.wss?uid=swg21682828

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - April 2014 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpuapr2014verbose-1972954.html

Trust: 0.8

title:Oracle Critical Patch Update Advisory - April 2014url:http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html

Trust: 0.8

title:April 2014 Critical Patch Update Releasedurl:https://blogs.oracle.com/security/entry/april_2014_critical_patch_update

Trust: 0.8

title:JSA10698url:http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698&actp=search

Trust: 0.8

title:HS14-009url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS14-009/index.html

Trust: 0.8

title:Oracle Corporation Javaプラグインの脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/oracle/20140417.html

Trust: 0.8

sources: JVNDB: JVNDB-2014-002096

EXTERNAL IDS

db:NVDid:CVE-2014-0429

Trust: 2.8

db:SECUNIAid:58415

Trust: 1.1

db:SECUNIAid:58974

Trust: 1.1

db:SECUNIAid:59058

Trust: 1.1

db:JUNIPERid:JSA10698

Trust: 1.1

db:BIDid:66856

Trust: 1.1

db:JVNDBid:JVNDB-2014-002096

Trust: 0.8

db:PACKETSTORMid:126183

Trust: 0.2

db:PACKETSTORMid:126443

Trust: 0.2

db:PACKETSTORMid:127041

Trust: 0.2

db:PACKETSTORMid:126664

Trust: 0.2

db:PACKETSTORMid:130400

Trust: 0.1

db:PACKETSTORMid:126320

Trust: 0.1

db:PACKETSTORMid:126182

Trust: 0.1

db:PACKETSTORMid:126181

Trust: 0.1

db:PACKETSTORMid:126413

Trust: 0.1

db:PACKETSTORMid:127027

Trust: 0.1

db:CNNVDid:CNNVD-201404-258

Trust: 0.1

db:VULHUBid:VHN-67922

Trust: 0.1

db:PACKETSTORMid:126611

Trust: 0.1

db:PACKETSTORMid:126200

Trust: 0.1

db:PACKETSTORMid:126201

Trust: 0.1

db:PACKETSTORMid:127655

Trust: 0.1

db:PACKETSTORMid:126494

Trust: 0.1

sources: VULHUB: VHN-67922 // JVNDB: JVNDB-2014-002096 // PACKETSTORM: 126611 // PACKETSTORM: 126200 // PACKETSTORM: 126201 // PACKETSTORM: 127655 // PACKETSTORM: 126443 // PACKETSTORM: 127041 // PACKETSTORM: 126664 // PACKETSTORM: 126494 // PACKETSTORM: 126183 // NVD: CVE-2014-0429

REFERENCES

url:http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html

Trust: 1.4

url:http://rhn.redhat.com/errata/rhsa-2014-0675.html

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2191-1

Trust: 1.2

url:http://www.securityfocus.com/bid/66856

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21672080

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676746

Trust: 1.1

url:https://www.ibm.com/support/docview.wss?uid=swg21675973

Trust: 1.1

url:http://www.debian.org/security/2014/dsa-2912

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-201406-32.xml

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-201502-12.xml

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2014:0413

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2014:0414

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2014-0685.html

Trust: 1.1

url:http://secunia.com/advisories/58415

Trust: 1.1

url:http://secunia.com/advisories/58974

Trust: 1.1

url:http://secunia.com/advisories/59058

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2187-1

Trust: 1.1

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10698

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=140852974709252&w=2

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0429

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2014-0429

Trust: 0.9

url:http://www.ipa.go.jp/security/ciadr/vul/20140416-jre.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2014/at140017.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0429

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0446

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-1876

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-2412

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-2414

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0451

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0457

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-2398

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0458

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0452

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0460

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0461

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0453

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0459

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-0456

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-2403

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-2397

Trust: 0.7

url:https://www.redhat.com/security/data/cve/cve-2014-0451.html

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-0453.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-0455

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-2421.html

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-0452.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-0454

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-2423.html

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-0461.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-2402

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-2427.html

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-0446.html

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-2414.html

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-2421

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-2427

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-0458.html

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-1876.html

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-0460.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-2423

Trust: 0.6

url:https://access.redhat.com/security/team/key/#package

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-2412.html

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-2398.html

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-0457.html

Trust: 0.6

url:https://www.redhat.com/security/data/cve/cve-2014-0429.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2013-6629

Trust: 0.5

url:https://access.redhat.com/site/articles/11258

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2013-6954

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-2413

Trust: 0.5

url:https://www.redhat.com/security/data/cve/cve-2014-2420.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2409.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0449.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2013-6629.html

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2013-6954.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0459.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0454.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2428.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2401.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0455.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2402.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2397.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0456.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2403.html

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-0449

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-2409

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-0448

Trust: 0.3

url:https://www.redhat.com/security/data/cve/cve-2014-0448.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-2401

Trust: 0.3

url:https://www.redhat.com/security/data/cve/cve-2014-2413.html

Trust: 0.3

url:https://www.ibm.com/developerworks/java/jdk/alerts/

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0432.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0432

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-2422.html

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10698

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=140852974709252&amp;w=2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2420

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0486.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2428

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0413.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0412.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5896.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5887

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0878.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5910

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0428.html

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5910.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0982.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0417

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5878

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5907

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0376

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5899.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0368

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0416.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0428

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0403.html

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0415

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0411

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0422

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0422.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0368.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0415.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5889.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5884

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0375.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0423

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0423.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5878.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0376.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0410

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0410.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5889

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0424

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5907.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0373.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0411.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0416

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0417.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0424.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0373

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5888

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5898.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5884.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5899

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0403

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0375

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5887.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0387.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5896

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5888.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0387

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-6/6b31-1.13.3-1ubuntu1~0.10.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0462

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2405

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-6/6b31-1.13.3-1ubuntu1~0.12.04.2

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2403

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0461

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0452

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0455

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1876

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0456

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2397

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2421

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://blog.fuseyism.com/index.php/2014/04/16/security-icedtea-2-4-7-for-openjdk-7-released/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2413

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0453

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2402

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2412

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2414

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0460

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0406.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0454

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2423

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2427

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0458

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0451

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0189.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0446

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0459

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0457

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2398

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0408.html

Trust: 0.1

sources: VULHUB: VHN-67922 // JVNDB: JVNDB-2014-002096 // PACKETSTORM: 126611 // PACKETSTORM: 126200 // PACKETSTORM: 126201 // PACKETSTORM: 127655 // PACKETSTORM: 126443 // PACKETSTORM: 127041 // PACKETSTORM: 126664 // PACKETSTORM: 126494 // PACKETSTORM: 126183 // NVD: CVE-2014-0429

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 126611 // PACKETSTORM: 126200 // PACKETSTORM: 126201 // PACKETSTORM: 127655 // PACKETSTORM: 127041 // PACKETSTORM: 126183

SOURCES

db:VULHUBid:VHN-67922
db:JVNDBid:JVNDB-2014-002096
db:PACKETSTORMid:126611
db:PACKETSTORMid:126200
db:PACKETSTORMid:126201
db:PACKETSTORMid:127655
db:PACKETSTORMid:126443
db:PACKETSTORMid:127041
db:PACKETSTORMid:126664
db:PACKETSTORMid:126494
db:PACKETSTORMid:126183
db:NVDid:CVE-2014-0429

LAST UPDATE DATE

2024-09-18T22:01:42.238000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-67922date:2022-05-09T00:00:00
db:JVNDBid:JVNDB-2014-002096date:2015-12-02T00:00:00
db:NVDid:CVE-2014-0429date:2022-05-13T14:57:20.510

SOURCES RELEASE DATE

db:VULHUBid:VHN-67922date:2014-04-16T00:00:00
db:JVNDBid:JVNDB-2014-002096date:2014-04-17T00:00:00
db:PACKETSTORMid:126611date:2014-05-14T15:09:44
db:PACKETSTORMid:126200date:2014-04-17T22:02:41
db:PACKETSTORMid:126201date:2014-04-17T22:02:50
db:PACKETSTORMid:127655date:2014-07-29T22:17:21
db:PACKETSTORMid:126443date:2014-05-02T06:40:40
db:PACKETSTORMid:127041date:2014-06-11T00:10:43
db:PACKETSTORMid:126664date:2014-05-19T03:11:59
db:PACKETSTORMid:126494date:2014-05-06T00:17:25
db:PACKETSTORMid:126183date:2014-04-16T20:42:18
db:NVDid:CVE-2014-0429date:2014-04-16T00:55:23.920