CVE-2014-0460

Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI.
References
Link Resource
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 Third Party Advisory
http://marc.info/?l=bugtraq&m=140852886808946&w=2 Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140852974709252&w=2 Issue Tracking Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0675.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0685.html Third Party Advisory
http://secunia.com/advisories/58415 Third Party Advisory
http://secunia.com/advisories/59022 Third Party Advisory
http://secunia.com/advisories/59023 Third Party Advisory
http://secunia.com/advisories/59058 Third Party Advisory
http://secunia.com/advisories/59071 Third Party Advisory
http://secunia.com/advisories/59082 Third Party Advisory
http://secunia.com/advisories/59250 Third Party Advisory
http://secunia.com/advisories/59255 Third Party Advisory
http://secunia.com/advisories/59307 Third Party Advisory
http://secunia.com/advisories/59436 Third Party Advisory
http://secunia.com/advisories/59516 Third Party Advisory
http://secunia.com/advisories/59642 Third Party Advisory
http://secunia.com/advisories/59704 Third Party Advisory
http://secunia.com/advisories/59705 Third Party Advisory
http://secunia.com/advisories/59706 Third Party Advisory
http://secunia.com/advisories/60003 Third Party Advisory
http://secunia.com/advisories/60111 Third Party Advisory
http://secunia.com/advisories/60117 Third Party Advisory
http://secunia.com/advisories/61264 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201406-32.xml Third Party Advisory
http://security.gentoo.org/glsa/glsa-201502-12.xml Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21672080 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21673836 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21674539 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676315 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676672 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676746 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677294 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21679713 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21681018 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21681256 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21683484 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21686717 Third Party Advisory
http://www.debian.org/security/2014/dsa-2912 Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21675343 Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21675588 Broken Link
http://www.ibm.com/support/docview.wss?uid=swg21677387 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html Vendor Advisory
http://www.securityfocus.com/bid/66916 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2187-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2191-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:0413 Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:0414 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:jrockit:r27.8.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jrockit:r28.3.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

Configuration 3 (hide)

cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:jdk:1.5.0:update61:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update71:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update61:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update71:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-04-16 01:55

Updated : 2024-02-28 12:20


NVD link : CVE-2014-0460

Mitre link : CVE-2014-0460

CVE.ORG link : CVE-2014-0460


JSON object : View

Products Affected

oracle

  • jre
  • jdk
  • jrockit

debian

  • debian_linux

canonical

  • ubuntu_linux

juniper

  • junos_space