Lucene search

K
cve[email protected]CVE-2007-5274
HistoryOct 08, 2007 - 11:17 p.m.

CVE-2007-5274

2007-10-0823:17:00
web.nvd.nist.gov
29
sun java
jre
remote attackers
security model
dns rebinding
firefox
opera
cve-2007-5274

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.047 Low

EPSS

Percentile

92.7%

Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273. NOTE: this is similar to CVE-2007-5232.

Affected configurations

NVD
Node
mozillafirefox
OR
operaopera_browser
AND
sunjdkRange1.6.0update2
OR
sunjdkMatch1.5.0update1
OR
sunjdkMatch1.5.0update10
OR
sunjdkMatch1.5.0update11
OR
sunjdkMatch1.5.0update12
OR
sunjdkMatch1.5.0update2
OR
sunjdkMatch1.5.0update3
OR
sunjdkMatch1.5.0update4
OR
sunjdkMatch1.5.0update5
OR
sunjdkMatch1.5.0update7
OR
sunjdkMatch1.5.0update8
OR
sunjdkMatch1.5.0update9
OR
sunjdkMatch1.6.0update1
OR
sunjdkMatch1.6.0update2
OR
sunjdkMatch6
OR
sunjdkMatch6update_1
OR
sunjreRange1.3.1update20
OR
sunjreRange1.4.2update15
OR
sunjreRange1.6.0update2
OR
sunjreMatch1.3.0
OR
sunjreMatch1.3.0update5
OR
sunjreMatch1.3.1update1
OR
sunjreMatch1.3.1update16
OR
sunjreMatch1.3.1update18
OR
sunjreMatch1.3.1update19
OR
sunjreMatch1.3.1update1a
OR
sunjreMatch1.4
OR
sunjreMatch1.4.1update3
OR
sunjreMatch1.4.2
OR
sunjreMatch1.4.2_1
OR
sunjreMatch1.4.2_3
OR
sunjreMatch1.4.2_8
OR
sunjreMatch1.4.2_9
OR
sunjreMatch1.4.2_10
OR
sunjreMatch1.4.2_11
OR
sunjreMatch1.4.2_12
OR
sunjreMatch1.4.2_13
OR
sunjreMatch1.4.2_14
OR
sunjreMatch1.5.0update1
OR
sunjreMatch1.5.0update10
OR
sunjreMatch1.5.0update11
OR
sunjreMatch1.5.0update12
OR
sunjreMatch1.5.0update2
OR
sunjreMatch1.5.0update3
OR
sunjreMatch1.5.0update4
OR
sunjreMatch1.5.0update5
OR
sunjreMatch1.5.0update6
OR
sunjreMatch1.5.0update7
OR
sunjreMatch1.5.0update8
OR
sunjreMatch1.5.0update9
OR
sunjreMatch1.6.0update_1
OR
sunsdkRange1.3.1_20
OR
sunsdkMatch1.3.1_01
OR
sunsdkMatch1.3.1_01a
OR
sunsdkMatch1.3.1_16
OR
sunsdkMatch1.3.1_18
OR
sunsdkMatch1.3.1_19
OR
sunsdkMatch1.4.2
OR
sunsdkMatch1.4.2_03
OR
sunsdkMatch1.4.2_08
OR
sunsdkMatch1.4.2_09
OR
sunsdkMatch1.4.2_10
OR
sunsdkMatch1.4.2_11
OR
sunsdkMatch1.4.2_12
OR
sunsdkMatch1.4.2_13
OR
sunsdkMatch1.4.2_14
OR
sunsdkMatch1.4.2_15

References

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.047 Low

EPSS

Percentile

92.7%