CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
95.4%
Issue Overview:
It was discovered that the Beans component in OpenJDK did not perform permission checks properly. An untrusted Java application or applet could use this flaw to use classes from restricted packages, allowing it to bypass Java sandbox restrictions. (CVE-2012-1682)
A hardening fix was applied to the AWT component in OpenJDK, removing functionality from the restricted SunToolkit class that was used in combination with other flaws to bypass Java sandbox restrictions. (CVE-2012-0547)
Affected Packages:
java-1.6.0-openjdk
Issue Correction:
Run yum update java-1.6.0-openjdk to update your system.
New Packages:
i686:
java-1.6.0-openjdk-demo-1.6.0.0-52.1.11.4.46.amzn1.i686
java-1.6.0-openjdk-1.6.0.0-52.1.11.4.46.amzn1.i686
java-1.6.0-openjdk-javadoc-1.6.0.0-52.1.11.4.46.amzn1.i686
java-1.6.0-openjdk-src-1.6.0.0-52.1.11.4.46.amzn1.i686
java-1.6.0-openjdk-debuginfo-1.6.0.0-52.1.11.4.46.amzn1.i686
java-1.6.0-openjdk-devel-1.6.0.0-52.1.11.4.46.amzn1.i686
src:
java-1.6.0-openjdk-1.6.0.0-52.1.11.4.46.amzn1.src
x86_64:
java-1.6.0-openjdk-src-1.6.0.0-52.1.11.4.46.amzn1.x86_64
java-1.6.0-openjdk-devel-1.6.0.0-52.1.11.4.46.amzn1.x86_64
java-1.6.0-openjdk-demo-1.6.0.0-52.1.11.4.46.amzn1.x86_64
java-1.6.0-openjdk-debuginfo-1.6.0.0-52.1.11.4.46.amzn1.x86_64
java-1.6.0-openjdk-1.6.0.0-52.1.11.4.46.amzn1.x86_64
java-1.6.0-openjdk-javadoc-1.6.0.0-52.1.11.4.46.amzn1.x86_64
Red Hat: CVE-2012-0547, CVE-2012-1682
Mitre: CVE-2012-0547, CVE-2012-1682