Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Oracle Java SE JRE Multiple Unspecified Vulnerabilities-01 Jul 2014 (Windows)

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

9 years ago

Modified

Modified

5 years ago

Summary

This host is installed with Oracle Java SE JRE and is prone to multiple unspecified vulnerabilities.

Insight

Insight

Multiple unspecified flaws exists, - An error in the JMX subcomponent related to share/classes/com/sun/jmx/remote/security/SubjectDelegator.java - An error related to the Hotspot subcomponent in share/vm/classfile/classFileParser.hpp - An error in the Libraries subcomponent related to share/classes/java/lang/reflect/Proxy.java and handling of interfaces passed to proxy methods. - An error within the Swing subcomponent related to missing access restrictions imposed by the file choosers. - An error in the Security subcomponent related to share/classes/java/security/Provider.java and instantiation of security services with non-public constructors. - An error in the Diffie-Hellman key agreement within the Security subcomponent related to 'validateDHPublicKey' function in share/classes/sun/security/util/KeyUtil.java - An error in Libraries subcomponent within 'AtomicReferenceFieldUpdaterImpl' function in /java/util/concurrent/atomic/AtomicReferenceFieldUpdater.java - An error in the Security subcomponent related to share/classes/sun/security/rsa/RSACore.java and RSA 'blinding'.

Affected Software

Affected Software

Oracle Java SE 5 update 65 and prior, 6 update 75 and prior, 7 update 60 and prior, and 8 update 5 and prior on Windows

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Apply the patch from the referenced advisory.