Vulnerabilidad en Oracle Java SE y Java SE Embedded (CVE-2016-3550)
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
21/07/2016
Última modificación:
12/04/2025
Descripción
Vulnerabilidad en Oracle Java SE 6u115, 7u101 y 8u92 y Java SE Embedded 8u91 permite a atacantes remotos afectar la confidencialidad a través de vectores relacionados con Hotspot.
Impacto
Puntuación base 3.x
4.30
Gravedad 3.x
MEDIA
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2016-1504.html
- http://rhn.redhat.com/errata/RHSA-2016-1776.html
- http://www.debian.org/security/2016/dsa-3641
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/91787
- http://www.securityfocus.com/bid/91951
- http://www.securitytracker.com/id/1036365
- http://www.ubuntu.com/usn/USN-3043-1
- http://www.ubuntu.com/usn/USN-3062-1
- http://www.ubuntu.com/usn/USN-3077-1
- https://access.redhat.com/errata/RHSA-2016:1458
- https://access.redhat.com/errata/RHSA-2016:1475
- https://access.redhat.com/errata/RHSA-2016:1476
- https://access.redhat.com/errata/RHSA-2016:1477
- https://security.gentoo.org/glsa/201610-08
- https://security.gentoo.org/glsa/201701-43
- https://security.netapp.com/advisory/ntap-20160721-0001/
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2016-1504.html
- http://rhn.redhat.com/errata/RHSA-2016-1776.html
- http://www.debian.org/security/2016/dsa-3641
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/91787
- http://www.securityfocus.com/bid/91951
- http://www.securitytracker.com/id/1036365
- http://www.ubuntu.com/usn/USN-3043-1
- http://www.ubuntu.com/usn/USN-3062-1
- http://www.ubuntu.com/usn/USN-3077-1
- https://access.redhat.com/errata/RHSA-2016:1458
- https://access.redhat.com/errata/RHSA-2016:1475
- https://access.redhat.com/errata/RHSA-2016:1476
- https://access.redhat.com/errata/RHSA-2016:1477
- https://security.gentoo.org/glsa/201610-08
- https://security.gentoo.org/glsa/201701-43
- https://security.netapp.com/advisory/ntap-20160721-0001/



