{ "id": "CVE-2016-0475", "sourceIdentifier": "secalert_us@oracle.com", "published": "2016-01-21T03:00:23.570", "lastModified": "2025-04-12T10:46:40.837", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries." }, { "lang": "es", "value": "Vulnerabilidad no especificada en los componentes Java SE, Java SE Embedded y JRockit en Oracle Java SE 8u66; Java SE Embedded 8u65; y JRockit R28.3.8 permite a atacantes remotos afectar a la confidencialidad y la integridad a trav\u00e9s de vectores desconocidos relacionados con Libraries." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*", "matchCriteriaId": "D6C77242-C6FB-4BED-BA51-E9477D64E311" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*", "matchCriteriaId": "1475C6EC-E2F6-4881-A89E-FB75C1AD1F20" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "79B1FE51-77FB-465F-BCF0-7076CBF54BF6" } ] } ] } ], "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html", "source": "secalert_us@oracle.com" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html", "source": "secalert_us@oracle.com" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html", "source": "secalert_us@oracle.com" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html", "source": "secalert_us@oracle.com" }, { "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "source": "secalert_us@oracle.com" }, { "url": "http://www.securitytracker.com/id/1034715", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148", "source": "secalert_us@oracle.com" }, { "url": "https://security.gentoo.org/glsa/201610-08", "source": "secalert_us@oracle.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securitytracker.com/id/1034715", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://security.gentoo.org/glsa/201610-08", "source": "af854a3a-2127-422b-91ae-364da2661108" } ], "evaluatorComment": "Per Oracle: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service." }