FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  368515
Date:      2014-09-18
Time:      19:53:09Z
Committer: madpilot

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
c93e4d41-75c5-11dc-b903-0016179b2dd5jdk/jre -- Applet Caching May Allow Network Access Restrictions to be Circumvented

SUN reports:

A vulnerability in the Java Runtime Environment (JRE) with applet caching may allow an untrusted applet that is downloaded from a malicious website to make network connections to network services on machines other than the one that the applet was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited.


Discovery 2007-10-03
Entry 2007-10-08
Modified 2007-11-16
jdk
ge 1.3.0 lt 1.6.0.3p3

ge 1.5.0,1 lt 1.5.0.13p7,1

linux-blackdown-jdk
ge 1.3.0

linux-sun-jdk
ge 1.3.0 lt 1.3.1.20

ge 1.4.0 lt 1.4.2.16

eq 1.5.0.b1

eq 1.5.0.b1,1

ge 1.5.0,2 lt 1.5.0.13,2

ge 1.6.0 lt 1.6.0.03

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103079-1
CVE-2007-5232
16846d1e-f1de-11e1-8bd8-0022156e8794Java 1.7 -- security manager bypass

US-CERT reports:

Oracle Java Runtime Environment (JRE) 1.7 contains a vulnerability that may allow an applet to call setSecurityManager in a way that allows setting of arbitrary permissions.

By leveraging the public, privileged getField() function, an untrusted Java applet can escalate its privileges by calling the setSecurityManager() function to allow full privileges, without requiring code signing.

This vulnerability is being actively exploited in the wild, and exploit code is publicly available.

This exploit does not only affect Java applets, but every piece of software that relies on the Java Security Manager for sandboxing executable code is affected: malicious code can totally disable Security Manager.


Discovery 2012-08-27
Entry 2012-08-30
Modified 2012-08-31
openjdk
ge 7.0 lt 7.6.24_1

linux-sun-jdk
ge 7.0 lt 7.7

linux-sun-jre
ge 7.0 lt 7.7

CVE-2012-4681
636312
http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-August/020065.html
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html
16846d1e-f1de-11e1-8bd8-0022156e8794Java 1.7 -- security manager bypass

US-CERT reports:

Oracle Java Runtime Environment (JRE) 1.7 contains a vulnerability that may allow an applet to call setSecurityManager in a way that allows setting of arbitrary permissions.

By leveraging the public, privileged getField() function, an untrusted Java applet can escalate its privileges by calling the setSecurityManager() function to allow full privileges, without requiring code signing.

This vulnerability is being actively exploited in the wild, and exploit code is publicly available.

This exploit does not only affect Java applets, but every piece of software that relies on the Java Security Manager for sandboxing executable code is affected: malicious code can totally disable Security Manager.


Discovery 2012-08-27
Entry 2012-08-30
Modified 2012-08-31
openjdk
ge 7.0 lt 7.6.24_1

linux-sun-jdk
ge 7.0 lt 7.7

linux-sun-jre
ge 7.0 lt 7.7

CVE-2012-4681
636312
http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-August/020065.html
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html
c93e4d41-75c5-11dc-b903-0016179b2dd5jdk/jre -- Applet Caching May Allow Network Access Restrictions to be Circumvented

SUN reports:

A vulnerability in the Java Runtime Environment (JRE) with applet caching may allow an untrusted applet that is downloaded from a malicious website to make network connections to network services on machines other than the one that the applet was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited.


Discovery 2007-10-03
Entry 2007-10-08
Modified 2007-11-16
jdk
ge 1.3.0 lt 1.6.0.3p3

ge 1.5.0,1 lt 1.5.0.13p7,1

linux-blackdown-jdk
ge 1.3.0

linux-sun-jdk
ge 1.3.0 lt 1.3.1.20

ge 1.4.0 lt 1.4.2.16

eq 1.5.0.b1

eq 1.5.0.b1,1

ge 1.5.0,2 lt 1.5.0.13,2

ge 1.6.0 lt 1.6.0.03

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103079-1
CVE-2007-5232
16846d1e-f1de-11e1-8bd8-0022156e8794Java 1.7 -- security manager bypass

US-CERT reports:

Oracle Java Runtime Environment (JRE) 1.7 contains a vulnerability that may allow an applet to call setSecurityManager in a way that allows setting of arbitrary permissions.

By leveraging the public, privileged getField() function, an untrusted Java applet can escalate its privileges by calling the setSecurityManager() function to allow full privileges, without requiring code signing.

This vulnerability is being actively exploited in the wild, and exploit code is publicly available.

This exploit does not only affect Java applets, but every piece of software that relies on the Java Security Manager for sandboxing executable code is affected: malicious code can totally disable Security Manager.


Discovery 2012-08-27
Entry 2012-08-30
Modified 2012-08-31
openjdk
ge 7.0 lt 7.6.24_1

linux-sun-jdk
ge 7.0 lt 7.7

linux-sun-jre
ge 7.0 lt 7.7

CVE-2012-4681
636312
http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-August/020065.html
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html