Skip to navigation

CVE Database

CVE-2012-0551

Impact: Moderate
Public: 2012-06-12
Bugzilla: 831355: CVE-2012-0551 Oracle JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)
IAVA: 2012-A-0153

Details

The MITRE CVE dictionary describes this issue as:

Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.

Find out more about CVE-2012-0551 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 5.8
Base Metrics: AV:N/AC:M/Au:N/C:P/I:N/A:P
Access Vector: Network
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux Server Supplementary (v. 5) (java-1.6.0-ibm) RHSA-2012:1238 September 06, 2012
Red Hat Enterprise Linux Server Supplementary (v. 5) (java-1.6.0-sun) RHSA-2012:0734 June 13, 2012
Red Hat Enterprise Linux Supplementary version 6 (java-1.6.0-ibm) RHSA-2012:1238 September 06, 2012
Red Hat Enterprise Linux Supplementary version 6 (java-1.6.0-sun) RHSA-2012:0734 June 13, 2012
Red Hat Enterprise Linux Supplementary version 6 (java-1.7.0-ibm) RHSA-2012:1289 September 18, 2012
Red Hat Enterprise Linux Supplementary version 6 (java-1.7.0-oracle) RHSA-2012:1019 June 20, 2012
Red Hat Satellite 5.4 (RHEL v.5) (java-1.6.0-ibm) RHSA-2013:1455 October 23, 2013
Red Hat Satellite 5.4 (RHEL v.6) (java-1.6.0-ibm) RHSA-2013:1455 October 23, 2013
Red Hat Satellite 5.5 (RHEL v.5) (java-1.6.0-ibm) RHSA-2013:1456 October 23, 2013
Red Hat Satellite 5.5 (RHEL v.6) (java-1.6.0-ibm) RHSA-2013:1456 October 23, 2013

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.