CVE-2012-1723

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
References
Link Resource
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html Mailing List
http://marc.info/?l=bugtraq&m=134496371727681&w=2 Mailing List
http://marc.info/?l=bugtraq&m=134496371727681&w=2 Mailing List
http://marc.info/?l=bugtraq&m=134496371727681&w=2 Mailing List
http://marc.info/?l=bugtraq&m=134496371727681&w=2 Mailing List
http://rhn.redhat.com/errata/RHSA-2012-0734.html Third Party Advisory
http://secunia.com/advisories/51080 Broken Link
http://security.gentoo.org/glsa/glsa-201406-32.xml Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21615246 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2012:095 Broken Link
http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html Vendor Advisory
http://www.securityfocus.com/bid/53960 Broken Link Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259 Broken Link
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html Mailing List
http://marc.info/?l=bugtraq&m=134496371727681&w=2 Mailing List
http://marc.info/?l=bugtraq&m=134496371727681&w=2 Mailing List
http://marc.info/?l=bugtraq&m=134496371727681&w=2 Mailing List
http://marc.info/?l=bugtraq&m=134496371727681&w=2 Mailing List
http://rhn.redhat.com/errata/RHSA-2012-0734.html Third Party Advisory
http://secunia.com/advisories/51080 Broken Link
http://security.gentoo.org/glsa/glsa-201406-32.xml Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21615246 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2012:095 Broken Link
http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html Vendor Advisory
http://www.securityfocus.com/bid/53960 Broken Link Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update32_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update32_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:icedtea6:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea6:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

10 Feb 2025, 20:15

Type Values Removed Values Added
CWE CWE-284

Information

Published : 2012-06-16 21:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-1723

Mitre link : CVE-2012-1723

CVE.ORG link : CVE-2012-1723


JSON object : View

Products Affected

oracle

  • jdk
  • jre

redhat

  • enterprise_linux_workstation
  • icedtea6
  • enterprise_linux_server_aus
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_server
CWE
NVD-CWE-noinfo CWE-284

Improper Access Control