CVE-2016-5582
Severity CVSS v4.0:
Pending analysis
Type:
CWE-284
Improper Access Control
Publication date:
25/10/2016
Last modified:
12/04/2025
Description
Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5573.
Impact
Base Score 3.x
9.60
Severity 3.x
CRITICAL
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:oracle:jdk:1.6.0:update121:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.7.0:update111:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.8.0:update101:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.8.0:update102:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update121:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.7.0:update111:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.8.0:update101:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.8.0:update102:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rhn.redhat.com/errata/RHSA-2016-2079.html
- http://rhn.redhat.com/errata/RHSA-2016-2088.html
- http://rhn.redhat.com/errata/RHSA-2016-2089.html
- http://rhn.redhat.com/errata/RHSA-2016-2090.html
- http://rhn.redhat.com/errata/RHSA-2016-2658.html
- http://rhn.redhat.com/errata/RHSA-2017-0061.html
- http://www.debian.org/security/2016/dsa-3707
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93623
- http://www.securitytracker.com/id/1037040
- http://www.ubuntu.com/usn/USN-3130-1
- http://www.ubuntu.com/usn/USN-3154-1
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/201611-04
- https://security.gentoo.org/glsa/201701-43
- https://security.netapp.com/advisory/ntap-20161019-0001/
- http://rhn.redhat.com/errata/RHSA-2016-2079.html
- http://rhn.redhat.com/errata/RHSA-2016-2088.html
- http://rhn.redhat.com/errata/RHSA-2016-2089.html
- http://rhn.redhat.com/errata/RHSA-2016-2090.html
- http://rhn.redhat.com/errata/RHSA-2016-2658.html
- http://rhn.redhat.com/errata/RHSA-2017-0061.html
- http://www.debian.org/security/2016/dsa-3707
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93623
- http://www.securitytracker.com/id/1037040
- http://www.ubuntu.com/usn/USN-3130-1
- http://www.ubuntu.com/usn/USN-3154-1
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/201611-04
- https://security.gentoo.org/glsa/201701-43
- https://security.netapp.com/advisory/ntap-20161019-0001/



