Vulnerabilidad en JavaScript en Sun Java Runtime Environment (CVE-2007-5274)
Gravedad CVSS v2.0:
BAJA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/10/2007
Última modificación:
09/04/2025
Descripción
Sun Java Runtime Environment (JRE) en JDK y JRE versión 6 Update 2 y anteriores, JDK y JRE versión 5.0 Update 12 y anteriores, SDK y JRE versión 1.4.2_15 y anteriores, y SDK y JRE versión 1.3.1_20 y anteriores, cuando Firefox u Opera son usados, permite a los atacantes remotos violar el modelo de seguridad para las conexiones salientes de JavaScript por medio de un ataque de reconexión de DNS de múltiples pines dependiente de la API LiveConnect, en la que la descarga JavaScript depende de la resolución DNS del navegador, pero las operaciones socket de JavaScript se basan en una resolución DNS separada por una máquina virtual Java (JVM), un problema diferente al CVE-2007-5273. NOTA: este es igual al CVE-2007-5232.
Impacto
Puntuación base 2.0
2.60
Gravedad 2.0
BAJA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:*:update2:*:*:*:*:*:* | 1.6.0 (incluyendo) | |
cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://crypto.stanford.edu/dns/dns-rebinding.pdf
- http://dev2dev.bea.com/pub/advisory/272
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
- http://secunia.com/advisories/27206
- http://secunia.com/advisories/27261
- http://secunia.com/advisories/27693
- http://secunia.com/advisories/27716
- http://secunia.com/advisories/27804
- http://secunia.com/advisories/28777
- http://secunia.com/advisories/28880
- http://secunia.com/advisories/29042
- http://secunia.com/advisories/29858
- http://secunia.com/advisories/29897
- http://secunia.com/advisories/30676
- http://secunia.com/advisories/30780
- http://security.gentoo.org/glsa/glsa-200804-28.xml
- http://securitytracker.com/id?1018771=
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103078-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200041-1
- http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
- http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
- http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml
- http://www.novell.com/linux/security/advisories/2007_55_java.html
- http://www.redhat.com/support/errata/RHSA-2007-0963.html
- http://www.redhat.com/support/errata/RHSA-2007-1041.html
- http://www.redhat.com/support/errata/RHSA-2008-0132.html
- http://www.securityfocus.com/archive/1/482926/100/0/threaded
- http://www.securityfocus.com/bid/25918
- http://www.vmware.com/security/advisories/VMSA-2008-0010.html
- http://www.vupen.com/english/advisories/2007/3895
- http://www.vupen.com/english/advisories/2008/0609
- http://www.vupen.com/english/advisories/2008/1856/references
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10908
- http://crypto.stanford.edu/dns/dns-rebinding.pdf
- http://dev2dev.bea.com/pub/advisory/272
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
- http://secunia.com/advisories/27206
- http://secunia.com/advisories/27261
- http://secunia.com/advisories/27693
- http://secunia.com/advisories/27716
- http://secunia.com/advisories/27804
- http://secunia.com/advisories/28777
- http://secunia.com/advisories/28880
- http://secunia.com/advisories/29042
- http://secunia.com/advisories/29858
- http://secunia.com/advisories/29897
- http://secunia.com/advisories/30676
- http://secunia.com/advisories/30780
- http://security.gentoo.org/glsa/glsa-200804-28.xml
- http://securitytracker.com/id?1018771=
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103078-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200041-1
- http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
- http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
- http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml
- http://www.novell.com/linux/security/advisories/2007_55_java.html
- http://www.redhat.com/support/errata/RHSA-2007-0963.html
- http://www.redhat.com/support/errata/RHSA-2007-1041.html
- http://www.redhat.com/support/errata/RHSA-2008-0132.html
- http://www.securityfocus.com/archive/1/482926/100/0/threaded
- http://www.securityfocus.com/bid/25918
- http://www.vmware.com/security/advisories/VMSA-2008-0010.html
- http://www.vupen.com/english/advisories/2007/3895
- http://www.vupen.com/english/advisories/2008/0609
- http://www.vupen.com/english/advisories/2008/1856/references
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10908