U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-5076

Change History

Modified Analysis by NIST 4/26/2024 12:07:14 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:* versions up to (including) 1.7.0
     *cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:* versions up to (including) 1.7.0
OR
     *cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html Mailing List, Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2012-1386.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2012-1386.html Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2012-1391.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2012-1391.html Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2012-1467.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2012-1467.html Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/51029 No Types Assigned
http://secunia.com/advisories/51029 Not Applicable
Changed Reference Type
http://secunia.com/advisories/51326 No Types Assigned
http://secunia.com/advisories/51326 Not Applicable
Changed Reference Type
http://secunia.com/advisories/51390 No Types Assigned
http://secunia.com/advisories/51390 Not Applicable
Changed Reference Type
http://security.gentoo.org/glsa/glsa-201406-32.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-201406-32.xml Third Party Advisory
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16641 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16641 Broken Link
Removed Evaluator Impact
Per: http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html

"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)"