Lucene search

K
cve[email protected]CVE-2007-5273
HistoryOct 08, 2007 - 11:17 p.m.

CVE-2007-5273

2007-10-0823:17:00
web.nvd.nist.gov
34
cve-2007-5273
sun java
jre
jdk
http proxy server
security model
applet
dns rebinding attack

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.047 Low

EPSS

Percentile

92.7%

Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet’s outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet’s socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.

Affected configurations

NVD
Node
sunjdkMatch1.5.0update1
OR
sunjdkMatch1.5.0update10
OR
sunjdkMatch1.5.0update11
OR
sunjdkMatch1.5.0update12
OR
sunjdkMatch1.5.0update2
OR
sunjdkMatch1.5.0update3
OR
sunjdkMatch1.5.0update4
OR
sunjdkMatch1.5.0update5
OR
sunjdkMatch1.5.0update7
OR
sunjdkMatch1.5.0update8
OR
sunjdkMatch1.5.0update9
OR
sunjdkMatch1.6.0update1
OR
sunjdkMatch1.6.0update2
OR
sunjreMatch1.3.0
OR
sunjreMatch1.3.0update5
OR
sunjreMatch1.3.1update1
OR
sunjreMatch1.3.1update16
OR
sunjreMatch1.3.1update18
OR
sunjreMatch1.3.1update19
OR
sunjreMatch1.3.1update1a
OR
sunjreMatch1.3.1update20
OR
sunjreMatch1.4
OR
sunjreMatch1.4.1update3
OR
sunjreMatch1.4.2
OR
sunjreMatch1.4.2_1
OR
sunjreMatch1.4.2_3
OR
sunjreMatch1.4.2_8
OR
sunjreMatch1.4.2_9
OR
sunjreMatch1.4.2_10
OR
sunjreMatch1.4.2_11
OR
sunjreMatch1.4.2_12
OR
sunjreMatch1.4.2_13
OR
sunjreMatch1.4.2_14
OR
sunjreMatch1.4.2_15
OR
sunjreMatch1.5.0update1
OR
sunjreMatch1.5.0update10
OR
sunjreMatch1.5.0update11
OR
sunjreMatch1.5.0update12
OR
sunjreMatch1.5.0update2
OR
sunjreMatch1.5.0update3
OR
sunjreMatch1.5.0update4
OR
sunjreMatch1.5.0update5
OR
sunjreMatch1.5.0update6
OR
sunjreMatch1.5.0update7
OR
sunjreMatch1.5.0update8
OR
sunjreMatch1.5.0update9
OR
sunjreMatch1.6.0update_1
OR
sunjreMatch1.6.0update_2
OR
sunsdkMatch1.3.1_01
OR
sunsdkMatch1.3.1_01a
OR
sunsdkMatch1.3.1_16
OR
sunsdkMatch1.3.1_18
OR
sunsdkMatch1.3.1_19
OR
sunsdkMatch1.3.1_20
OR
sunsdkMatch1.4.2
OR
sunsdkMatch1.4.2_03
OR
sunsdkMatch1.4.2_08
OR
sunsdkMatch1.4.2_09
OR
sunsdkMatch1.4.2_10
OR
sunsdkMatch1.4.2_11
OR
sunsdkMatch1.4.2_12
OR
sunsdkMatch1.4.2_13
OR
sunsdkMatch1.4.2_14
OR
sunsdkMatch1.4.2_15

References

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.047 Low

EPSS

Percentile

92.7%