Vulnerabilidad en Sun Java Runtime Environment (JRE) en JDK y JRE (CVE-2007-5273)
Gravedad CVSS v2.0:
BAJA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/10/2007
Última modificación:
09/04/2025
Descripción
En Sun Java Runtime Environment (JRE) en JDK y JRE versión 6 Update 2 y anteriores, JDK y JRE versión 5.0 Update 12 y anteriores, SDK y JRE versión 1.4.2_15 y anteriores, y SDK y JRE versión 1.3.1_20 y anteriores, cuando un servidor proxy HTTP se utiliza, permite a los atacantes remotos violar el modelo de seguridad para las conexiones salientes de un applets por medio de un ataque de reajuste de múlti-pin DNS en el que la descarga del applet depende de la resolución DNS en el servidor proxy, pero las operaciones de socket del applet dependen de la resolución DNS en máquina local, un problema diferente de CVE-2007-5274. NOTA: esto es similar a CVE-2007-5232.
Impacto
Puntuación base 2.0
2.60
Gravedad 2.0
BAJA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://crypto.stanford.edu/dns/dns-rebinding.pdf
- http://dev2dev.bea.com/pub/advisory/272
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
- http://osvdb.org/45527
- http://seclists.org/fulldisclosure/2007/Jul/0159.html
- http://secunia.com/advisories/27206
- http://secunia.com/advisories/27261
- http://secunia.com/advisories/27693
- http://secunia.com/advisories/27716
- http://secunia.com/advisories/27804
- http://secunia.com/advisories/28777
- http://secunia.com/advisories/28880
- http://secunia.com/advisories/29042
- http://secunia.com/advisories/29214
- http://secunia.com/advisories/29340
- http://secunia.com/advisories/29858
- http://secunia.com/advisories/29897
- http://secunia.com/advisories/30780
- http://security.gentoo.org/glsa/glsa-200804-28.xml
- http://securitytracker.com/id?1018771=
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103078-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200041-1
- http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
- http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
- http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml
- http://www.novell.com/linux/security/advisories/2007_55_java.html
- http://www.redhat.com/support/errata/RHSA-2007-0963.html
- http://www.redhat.com/support/errata/RHSA-2007-1041.html
- http://www.redhat.com/support/errata/RHSA-2008-0100.html
- http://www.redhat.com/support/errata/RHSA-2008-0132.html
- http://www.redhat.com/support/errata/RHSA-2008-0156.html
- http://www.securityfocus.com/archive/1/482926/100/0/threaded
- http://www.securityfocus.com/bid/25918
- http://www.vupen.com/english/advisories/2007/3895
- http://www.vupen.com/english/advisories/2008/0609
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10340
- http://crypto.stanford.edu/dns/dns-rebinding.pdf
- http://dev2dev.bea.com/pub/advisory/272
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
- http://osvdb.org/45527
- http://seclists.org/fulldisclosure/2007/Jul/0159.html
- http://secunia.com/advisories/27206
- http://secunia.com/advisories/27261
- http://secunia.com/advisories/27693
- http://secunia.com/advisories/27716
- http://secunia.com/advisories/27804
- http://secunia.com/advisories/28777
- http://secunia.com/advisories/28880
- http://secunia.com/advisories/29042
- http://secunia.com/advisories/29214
- http://secunia.com/advisories/29340
- http://secunia.com/advisories/29858
- http://secunia.com/advisories/29897
- http://secunia.com/advisories/30780
- http://security.gentoo.org/glsa/glsa-200804-28.xml
- http://securitytracker.com/id?1018771=
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103078-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200041-1
- http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
- http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
- http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml
- http://www.novell.com/linux/security/advisories/2007_55_java.html
- http://www.redhat.com/support/errata/RHSA-2007-0963.html
- http://www.redhat.com/support/errata/RHSA-2007-1041.html
- http://www.redhat.com/support/errata/RHSA-2008-0100.html
- http://www.redhat.com/support/errata/RHSA-2008-0132.html
- http://www.redhat.com/support/errata/RHSA-2008-0156.html
- http://www.securityfocus.com/archive/1/482926/100/0/threaded
- http://www.securityfocus.com/bid/25918
- http://www.vupen.com/english/advisories/2007/3895
- http://www.vupen.com/english/advisories/2008/0609
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10340