CVE-2015-0410

Severity

50%

Complexity

99%

Confidentiality

48%

Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows remote attackers to affect availability via unknown vectors related to Security.

Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).

Overview

First reported 10 years ago

2015-01-21 18:59:00

Last updated 5 years ago

2019-04-22 17:48:00

Affected Software

Oracle JDK 1.5.0 Update 75

1.5.0

Oracle JDK 1.6.0 Update 85

1.6.0

Oracle JDK 1.7.0 Update 71

1.7.0

Oracle JDK 1.7.0 update72

1.7.0

Oracle JDK 1.8.0 Update 25

1.8.0

Oracle JDK 1.8.0 Update 6

1.8.0

Oracle JRE 1.5.0 Update 75

1.5.0

Oracle JRE 1.6.0 Update 85

1.6.0

Oracle JRE 1.7.0 Update 71

1.7.0

Oracle JRE 1.7.0 Update 72

1.7.0

Oracle JRE 1.8.0 Update 25

1.8.0

Oracle JRE 1.8.0 Update 6

1.8.0

Oracle JRockit R27.8.4

r27.8.4

Oracle JRockit R28.3.4

r28.3.4

Canonical Ubuntu Linux 10.04 LTS

10.04

Canonical Ubuntu Linux 12.04 LTS

12.04

Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)

14.04

Canonical Ubuntu Linux 14.10

14.10

Debian Linux 7.0

7.0

Debian Linux 8.0 (Jessie)

8.0

Novell SUSE Linux Enterprise Desktop 11.0 Service Pack 3

11.0

Novell SUSE Linux Enterprise Server 12.0

12.0

OpenSUSE 13.2

13.2

Red Hat Enterprise Linux 5.0

5.0

Red Hat Enterprise Linux 6.0

6.0

Red Hat Enterprise Linux (RHEL) 7.0 (7)

7.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.