CVE-2015-5006
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
07/12/2015
Last modified:
12/04/2025
Description
IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR2, 7 R1 before SR3 FP20, 7 before SR9 FP20, 6 R1 before SR8 FP15, and 6 before SR16 FP15 allow physically proximate attackers to obtain sensitive information by reading the Kerberos Credential Cache.
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ibm:java_2_sdk:*:*:*:*:technology:*:*:* | 5.0.0.0 (including) | 5.0.16.13 (including) |
| cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:* | 6.0.0.0 (including) | 6.0.16.15 (excluding) |
| cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:* | 6.1.0.0. (including) | 6.1.8.15 (excluding) |
| cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:* | 7.0.0.0 (including) | 7.0.9.20 (excluding) |
| cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:* | 7.1.0.0 (including) | 7.1.3.20 (excluding) |
| cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:* | 8.0.0.0 (including) | 8.0.2.0 (excluding) |
| cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2015-2506.html
- http://rhn.redhat.com/errata/RHSA-2015-2507.html
- http://rhn.redhat.com/errata/RHSA-2015-2508.html
- http://rhn.redhat.com/errata/RHSA-2015-2509.html
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV78316
- http://www-01.ibm.com/support/docview.wss?uid=swg21969225
- http://www.securityfocus.com/bid/77645
- http://www.securitytracker.com/id/1034214
- https://access.redhat.com/errata/RHSA-2016:1430
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2015-2506.html
- http://rhn.redhat.com/errata/RHSA-2015-2507.html
- http://rhn.redhat.com/errata/RHSA-2015-2508.html
- http://rhn.redhat.com/errata/RHSA-2015-2509.html
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV78316
- http://www-01.ibm.com/support/docview.wss?uid=swg21969225
- http://www.securityfocus.com/bid/77645
- http://www.securitytracker.com/id/1034214
- https://access.redhat.com/errata/RHSA-2016:1430



