U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-0507

Change History

Modified Analysis by NIST 4/26/2024 12:07:55 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_java:11:sp1:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
     *cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:*:update30:*:*:*:*:*:* versions up to (including) 1.6.0
     *cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
OR
     *cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:-:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:*:update2:*:*:*:*:*:* versions up to (including) 1.7.0
OR
     *cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:*:update33:*:*:*:*:*:* versions up to (including) 1.5.0
OR
     *cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
Removed Evaluator Impact
Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html 'Applies to client deployments of Java. This vulnerability can be exploited only through Untrusted Java Web Start applications and Untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)'

								
						
Changed Reference Type
http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx No Types Assigned
http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx Third Party Advisory
Changed Reference Type
http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/ No Types Assigned
http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/ Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html Issue Tracking, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=133364885411663&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=133364885411663&w=2 Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=133365109612558&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=133365109612558&w=2 Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=133847939902305&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=133847939902305&w=2 Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=134254866602253&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=134254866602253&w=2 Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=134254957702612&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=134254957702612&w=2 Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2012-0508.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2012-0508.html Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2012-0514.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2012-0514.html Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2013-1455.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2013-1455.html Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/48589 No Types Assigned
http://secunia.com/advisories/48589 Not Applicable
Changed Reference Type
http://secunia.com/advisories/48692 No Types Assigned
http://secunia.com/advisories/48692 Not Applicable
Changed Reference Type
http://secunia.com/advisories/48915 No Types Assigned
http://secunia.com/advisories/48915 Not Applicable
Changed Reference Type
http://secunia.com/advisories/48948 No Types Assigned
http://secunia.com/advisories/48948 Not Applicable
Changed Reference Type
http://secunia.com/advisories/48950 No Types Assigned
http://secunia.com/advisories/48950 Not Applicable
Changed Reference Type
http://www.debian.org/security/2012/dsa-2420 No Types Assigned
http://www.debian.org/security/2012/dsa-2420 Mailing List, Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/52161 Exploit
http://www.securityfocus.com/bid/52161 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=788994 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=788994 Issue Tracking