CVE-2014-0460

Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI.
References
Link Resource
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 Third Party Advisory
http://marc.info/?l=bugtraq&m=140852886808946&w=2 Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140852974709252&w=2 Issue Tracking Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0675.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0685.html Third Party Advisory
http://secunia.com/advisories/58415 Third Party Advisory
http://secunia.com/advisories/59022 Third Party Advisory
http://secunia.com/advisories/59023 Third Party Advisory
http://secunia.com/advisories/59058 Third Party Advisory
http://secunia.com/advisories/59071 Third Party Advisory
http://secunia.com/advisories/59082 Third Party Advisory
http://secunia.com/advisories/59250 Third Party Advisory
http://secunia.com/advisories/59255 Third Party Advisory
http://secunia.com/advisories/59307 Third Party Advisory
http://secunia.com/advisories/59436 Third Party Advisory
http://secunia.com/advisories/59516 Third Party Advisory
http://secunia.com/advisories/59642 Third Party Advisory
http://secunia.com/advisories/59704 Third Party Advisory
http://secunia.com/advisories/59705 Third Party Advisory
http://secunia.com/advisories/59706 Third Party Advisory
http://secunia.com/advisories/60003 Third Party Advisory
http://secunia.com/advisories/60111 Third Party Advisory
http://secunia.com/advisories/60117 Third Party Advisory
http://secunia.com/advisories/61264 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201406-32.xml Third Party Advisory
http://security.gentoo.org/glsa/glsa-201502-12.xml Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21672080 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21673836 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21674539 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676315 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676672 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676746 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677294 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21679713 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21681018 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21681256 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21683484 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21686717 Third Party Advisory
http://www.debian.org/security/2014/dsa-2912 Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21675343 Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21675588 Broken Link
http://www.ibm.com/support/docview.wss?uid=swg21677387 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html Vendor Advisory
http://www.securityfocus.com/bid/66916 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2187-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2191-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:0413 Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:0414 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:jrockit:r27.8.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jrockit:r28.3.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

Configuration 3 (hide)

cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:jdk:1.5.0:update61:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update71:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update61:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update71:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

13 May 2022, 14:57

Type Values Removed Values Added
CPE cpe:2.3:a:oracle:jdk:1.5.0:update_61:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update_71:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_71:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update_61:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update_51:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update61:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update71:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update61:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update71:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*

09 May 2022, 20:01

Type Values Removed Values Added
First Time Canonical ubuntu Linux
Debian
Debian debian Linux
Canonical
References (UBUNTU) http://www.ubuntu.com/usn/USN-2191-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-2191-1 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59436 - (SECUNIA) http://secunia.com/advisories/59436 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59023 - (SECUNIA) http://secunia.com/advisories/59023 - Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0685.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0685.html - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676672 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676672 - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21681018 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21681018 - Broken Link
References (SECUNIA) http://secunia.com/advisories/59250 - (SECUNIA) http://secunia.com/advisories/59250 - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676746 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676746 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/60117 - (SECUNIA) http://secunia.com/advisories/60117 - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21679713 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21679713 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59704 - (SECUNIA) http://secunia.com/advisories/59704 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59307 - (SECUNIA) http://secunia.com/advisories/59307 - Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2014/dsa-2912 - (DEBIAN) http://www.debian.org/security/2014/dsa-2912 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/66916 - (BID) http://www.securityfocus.com/bid/66916 - Third Party Advisory, VDB Entry
References (GENTOO) http://security.gentoo.org/glsa/glsa-201406-32.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-201406-32.xml - Third Party Advisory
References (GENTOO) http://security.gentoo.org/glsa/glsa-201502-12.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-201502-12.xml - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/58415 - (SECUNIA) http://secunia.com/advisories/58415 - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21677294 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21677294 - Broken Link
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21673836 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21673836 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59255 - (SECUNIA) http://secunia.com/advisories/59255 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2014:0414 - (REDHAT) https://access.redhat.com/errata/RHSA-2014:0414 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59706 - (SECUNIA) http://secunia.com/advisories/59706 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/61264 - (SECUNIA) http://secunia.com/advisories/61264 - Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0675.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0675.html - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59516 - (SECUNIA) http://secunia.com/advisories/59516 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2014:0413 - (REDHAT) https://access.redhat.com/errata/RHSA-2014:0413 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59071 - (SECUNIA) http://secunia.com/advisories/59071 - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21674539 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21674539 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59058 - (SECUNIA) http://secunia.com/advisories/59058 - Third Party Advisory
References (CONFIRM) http://www.ibm.com/support/docview.wss?uid=swg21677387 - (CONFIRM) http://www.ibm.com/support/docview.wss?uid=swg21677387 - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21686717 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21686717 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-2187-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-2187-1 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59705 - (SECUNIA) http://secunia.com/advisories/59705 - Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=140852886808946&w=2 - (HP) http://marc.info/?l=bugtraq&m=140852886808946&w=2 - Issue Tracking, Mailing List, Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21681256 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21681256 - Third Party Advisory
References (CONFIRM) http://www.ibm.com/support/docview.wss?uid=swg21675343 - (CONFIRM) http://www.ibm.com/support/docview.wss?uid=swg21675343 - Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=140852974709252&w=2 - (HP) http://marc.info/?l=bugtraq&m=140852974709252&w=2 - Issue Tracking, Mailing List, Third Party Advisory
References (CONFIRM) http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 - (CONFIRM) http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59642 - (SECUNIA) http://secunia.com/advisories/59642 - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676315 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676315 - Broken Link
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21672080 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21672080 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59022 - (SECUNIA) http://secunia.com/advisories/59022 - Third Party Advisory
References (CONFIRM) http://www.ibm.com/support/docview.wss?uid=swg21675588 - (CONFIRM) http://www.ibm.com/support/docview.wss?uid=swg21675588 - Broken Link
References (SECUNIA) http://secunia.com/advisories/59082 - (SECUNIA) http://secunia.com/advisories/59082 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/60003 - (SECUNIA) http://secunia.com/advisories/60003 - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21683484 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21683484 - Broken Link
References (SECUNIA) http://secunia.com/advisories/60111 - (SECUNIA) http://secunia.com/advisories/60111 - Third Party Advisory
CPE cpe:2.3:a:oracle:jre:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:juniper:junos_space:15.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

Information

Published : 2014-04-16 01:55

Updated : 2023-12-10 11:31


NVD link : CVE-2014-0460

Mitre link : CVE-2014-0460

CVE.ORG link : CVE-2014-0460


JSON object : View

Products Affected

oracle

  • jre
  • jrockit
  • jdk

juniper

  • junos_space

debian

  • debian_linux

canonical

  • ubuntu_linux