Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-5273

Опубликовано: 08 окт. 2007
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.6

Описание

Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

released

1.5.0-13-0ubuntu1
hardy

released

1.5.0-13-0ubuntu1
intrepid

released

1.5.0-13-0ubuntu1
jaunty

released

1.5.0-13-0ubuntu1
karmic

DNE

upstream

released

5.0 Update 13

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

6-03-0ubuntu2
edgy

DNE

feisty

ignored

end of life, was needed
gutsy

released

6-03-0ubuntu2
hardy

released

6-03-0ubuntu2
intrepid

released

6-03-0ubuntu2
jaunty

released

6-03-0ubuntu2
karmic

released

6-03-0ubuntu2
upstream

released

6 Update 3

Показывать по

Ссылки на источники

EPSS

Процентиль: 91%
0.06511
Низкий

2.6 Low

CVSS2

Связанные уязвимости

redhat
около 18 лет назад

Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.

nvd
почти 18 лет назад

Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.

debian
почти 18 лет назад

Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earli ...

github
больше 3 лет назад

Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.

EPSS

Процентиль: 91%
0.06511
Низкий

2.6 Low

CVSS2