National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2007-5274 Detail

Current Description

Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273. NOTE: this is similar to CVE-2007-5232.

Source:  MITRE
Description Last Modified:  10/08/2007
View Analysis Description

Impact

CVSS v2.0 Severity and Metrics:

Base Score: 2.6 LOW
Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:N) (V2 legend)
Impact Subscore: 2.9
Exploitability Subscore: 4.9


Access Vector (AV): Network
Access Complexity (AC): High
Authentication (AU): None
Confidentiality (C): None
Integrity (I): Partial
Availability (A): None
Additional Information:
Victim must voluntarily interact with attack mechanism
Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://crypto.stanford.edu/dns/dns-rebinding.pdf
http://dev2dev.bea.com/pub/advisory/272
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
http://security.gentoo.org/glsa/glsa-200804-28.xml
http://securitytracker.com/id?1018771
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103078-1 Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200041-1 Vendor Advisory
http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml
http://www.novell.com/linux/security/advisories/2007_55_java.html
http://www.redhat.com/support/errata/RHSA-2007-0963.html
http://www.redhat.com/support/errata/RHSA-2007-1041.html
http://www.redhat.com/support/errata/RHSA-2008-0132.html
http://www.securityfocus.com/archive/1/482926/100/0/threaded
http://www.securityfocus.com/bid/25918
http://www.vmware.com/security/advisories/VMSA-2008-0010.html
http://www.vupen.com/english/advisories/2007/3895 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0609 Vendor Advisory
http://www.vupen.com/english/advisories/2008/1856/references Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10908

References to Check Content

Identifier:
oval:org.mitre.oval:def:10908
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:10908

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.3

Configuration 1
AND
OR
cpe:/a:mozilla:firefox
cpe:/a:opera:opera_browser
OR
cpe:/a:sun:jdk:1.5.0:update1
cpe:/a:sun:jdk:1.5.0:update10
cpe:/a:sun:jdk:1.5.0:update11
cpe:/a:sun:jdk:1.5.0:update12
cpe:/a:sun:jdk:1.5.0:update2
cpe:/a:sun:jdk:1.5.0:update3
cpe:/a:sun:jdk:1.5.0:update4
cpe:/a:sun:jdk:1.5.0:update5
cpe:/a:sun:jdk:1.5.0:update7
cpe:/a:sun:jdk:1.5.0:update8
cpe:/a:sun:jdk:1.5.0:update9
cpe:/a:sun:jdk:1.6.0:update1
cpe:/a:sun:jdk:1.6.0:update2
cpe:/a:sun:jdk::update2    versions up to (including) 1.6.0
cpe:/a:sun:jdk:6
cpe:/a:sun:jdk:6:update_1
cpe:/a:sun:jre:1.3.0
cpe:/a:sun:jre:1.3.0:update5
cpe:/a:sun:jre:1.3.1:update1
cpe:/a:sun:jre:1.3.1:update16
cpe:/a:sun:jre:1.3.1:update18
cpe:/a:sun:jre:1.3.1:update19
cpe:/a:sun:jre:1.3.1:update1a
cpe:/a:sun:jre::update20    versions up to (including) 1.3.1
cpe:/a:sun:jre:1.4
cpe:/a:sun:jre:1.4.1:update3
cpe:/a:sun:jre:1.4.2
cpe:/a:sun:jre::update15    versions up to (including) 1.4.2
cpe:/a:sun:jre:1.4.2_1
cpe:/a:sun:jre:1.4.2_3
cpe:/a:sun:jre:1.4.2_8
cpe:/a:sun:jre:1.4.2_9
cpe:/a:sun:jre:1.4.2_10
cpe:/a:sun:jre:1.4.2_11
cpe:/a:sun:jre:1.4.2_12
cpe:/a:sun:jre:1.4.2_13
cpe:/a:sun:jre:1.4.2_14
cpe:/a:sun:jre:1.5.0:update1
cpe:/a:sun:jre:1.5.0:update10
cpe:/a:sun:jre:1.5.0:update11
cpe:/a:sun:jre:1.5.0:update12
cpe:/a:sun:jre:1.5.0:update2
cpe:/a:sun:jre:1.5.0:update3
cpe:/a:sun:jre:1.5.0:update4
cpe:/a:sun:jre:1.5.0:update5
cpe:/a:sun:jre:1.5.0:update6
cpe:/a:sun:jre:1.5.0:update7
cpe:/a:sun:jre:1.5.0:update8
cpe:/a:sun:jre:1.5.0:update9
cpe:/a:sun:jre::update2    versions up to (including) 1.6.0
cpe:/a:sun:jre:1.6.0:update_1
cpe:/a:sun:sdk:1.3.1_01
cpe:/a:sun:sdk:1.3.1_01a
cpe:/a:sun:sdk:1.3.1_16
cpe:/a:sun:sdk:1.3.1_18
cpe:/a:sun:sdk:1.3.1_19
cpe:/a:sun:sdk    versions up to (including) 1.3.1_20
cpe:/a:sun:sdk:1.4.2
cpe:/a:sun:sdk:1.4.2_03
cpe:/a:sun:sdk:1.4.2_08
cpe:/a:sun:sdk:1.4.2_09
cpe:/a:sun:sdk:1.4.2_10
cpe:/a:sun:sdk:1.4.2_11
cpe:/a:sun:sdk:1.4.2_12
cpe:/a:sun:sdk:1.4.2_13
cpe:/a:sun:sdk:1.4.2_14
cpe:/a:sun:sdk:1.4.2_15

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

14 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2007-5274
NVD Published Date:
10/08/2007
NVD Last Modified:
10/30/2018