ID CVE-2014-0418
Summary Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0410, CVE-2014-0415, and CVE-2014-0424.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary_aus:6.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary_aus:6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.5.z:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.5.z:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update65:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update65:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update65:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update65:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*
  • cpe:2.3:a:hp:jdk:7.0.08:*:*:*:*:*:*:*
    cpe:2.3:a:hp:jdk:7.0.08:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:jre:7.0.08:*:*:*:*:*:*:*
    cpe:2.3:a:hp:jre:7.0.08:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 13-05-2022 - 14:57)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
redhat via4
advisories
  • rhsa
    id RHSA-2014:0030
  • rhsa
    id RHSA-2014:0414
rpms
  • java-1.7.0-oracle-1:1.7.0.51-1jpp.1.el5_10
  • java-1.7.0-oracle-1:1.7.0.51-1jpp.1.el6_5
  • java-1.7.0-oracle-devel-1:1.7.0.51-1jpp.1.el5_10
  • java-1.7.0-oracle-devel-1:1.7.0.51-1jpp.1.el6_5
  • java-1.7.0-oracle-javafx-1:1.7.0.51-1jpp.1.el5_10
  • java-1.7.0-oracle-javafx-1:1.7.0.51-1jpp.1.el6_5
  • java-1.7.0-oracle-jdbc-1:1.7.0.51-1jpp.1.el5_10
  • java-1.7.0-oracle-jdbc-1:1.7.0.51-1jpp.1.el6_5
  • java-1.7.0-oracle-plugin-1:1.7.0.51-1jpp.1.el5_10
  • java-1.7.0-oracle-plugin-1:1.7.0.51-1jpp.1.el6_5
  • java-1.7.0-oracle-src-1:1.7.0.51-1jpp.1.el5_10
  • java-1.7.0-oracle-src-1:1.7.0.51-1jpp.1.el6_5
  • java-1.6.0-sun-1:1.6.0.75-1jpp.1.el6_5
  • java-1.6.0-sun-1:1.6.0.75-1jpp.3.el5_10
  • java-1.6.0-sun-demo-1:1.6.0.75-1jpp.1.el6_5
  • java-1.6.0-sun-demo-1:1.6.0.75-1jpp.3.el5_10
  • java-1.6.0-sun-devel-1:1.6.0.75-1jpp.1.el6_5
  • java-1.6.0-sun-devel-1:1.6.0.75-1jpp.3.el5_10
  • java-1.6.0-sun-jdbc-1:1.6.0.75-1jpp.1.el6_5
  • java-1.6.0-sun-jdbc-1:1.6.0.75-1jpp.3.el5_10
  • java-1.6.0-sun-plugin-1:1.6.0.75-1jpp.1.el6_5
  • java-1.6.0-sun-plugin-1:1.6.0.75-1jpp.3.el5_10
  • java-1.6.0-sun-src-1:1.6.0.75-1jpp.1.el6_5
  • java-1.6.0-sun-src-1:1.6.0.75-1jpp.3.el5_10
refmap via4
bid
  • 64758
  • 64917
confirm
hp
  • HPSBUX02972
  • HPSBUX02973
  • SSRT101454
  • SSRT101455
osvdb 102012
sectrack 1029608
secunia
  • 56485
  • 56535
xf oracle-cpujan2014-cve20140418(90344)
Last major update 13-05-2022 - 14:57
Published 15-01-2014 - 16:08
Last modified 13-05-2022 - 14:57
Back to Top