Описание
Multiple serious vulnerabilities have been found in Oracle Java SE components. Malicious users can exploit these vulnerabilities to gain privileges, cause a denial of service or obtain sensitive information.
Below is a complete list of vulnerabilities:
- An unspecified vulnerability in Libraries subcomponent can be exploited remotely by an unauthenticated attacker via multiple protocols to gain privileges and cause a partial denial of service as a result;
- An unspecified vulnerability in Libraries subcomponent can be exploited remotely by an unauthenticated attacker via multiple protocols to gain privileges and obtain sensitive information.
Technical details
Vulnerability (1) is related to Java SE, Java SE Embedded and JRockit components of Oracle Java SE.
Vulnerability (1) is applicable to both client and server deployment of Java.
Vulnerability (1) can be exploited via sandboxed Java applets and sandboxed Java Web Start applications. Other way to exploit given vulnerability is to supply data to APIs in the specified Component. In this case neither Java Web Start applications nor sandboxed Java applets are necessary — attack can be performed, for example, through a web service.
Vulnerability (2) is related to Java SE, Java SE Embedded components of Oracle Java SE.
Successful attack of vulnerability (2) requires user interaction (with not the same person as the unauthenticated attacker).
Vulnerability (2) is frequently applicable to Java deployments, where clients use sandboxed Java applets and sandboxed Java Web Start applications, which load and run untrusted code, for example, code coming from the internet.
Vulnerability (2) is frequently not applicable to Java deployments, where only trusted code is loaded and run on servers (for example, code provided by an administrator).
Первичный источник обнаружения
Связанные продукты
- Oracle-Java-JRE-1.7.x
- Oracle-Java-JDK-1.7.x
- Oracle-Java-JDK-1.8.x
- Oracle-Java-JRE-1.8.x
- Oracle-JRockit
Список CVE
- CVE-2016-5547 warning
- CVE-2016-5549 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com