CVE-2011-3544

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.

References

http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html

http://marc.info/?l=bugtraq&m=132750579901589&w=2

http://marc.info/?l=bugtraq&m=134254866602253&w=2

http://marc.info/?l=bugtraq&m=134254957702612&w=2

http://rhn.redhat.com/errata/RHSA-2013-1455.html

http://secunia.com/advisories/48308

http://security.gentoo.org/glsa/glsa-201406-32.xml

http://www.ibm.com/developerworks/java/jdk/alerts/

http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html

http://www.redhat.com/support/errata/RHSA-2011-1384.html

http://www.securityfocus.com/bid/50218

http://www.securitytracker.com/id?1026215

http://www.ubuntu.com/usn/USN-1263-1

https://exchange.xforce.ibmcloud.com/vulnerabilities/70849

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13947

Details

Source: MITRE

Published: 2011-10-19

Updated: 2018-01-06

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:sun:jdk:1.7.0:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.7.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_23:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_24:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_25:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_26:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:*:update_27:*:*:*:*:*:* versions up to 1.6.0 (inclusive)

cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_23:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_24:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_25:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_26:*:*:*:*:*:*

cpe:2.3:a:sun:jre:*:update_27:*:*:*:*:*:* versions up to 1.6.0 (inclusive)

cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*

Tenable Plugins

View all (30 total)

IDNameProductFamilySeverity
89106VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2012-0005) (BEAST) (remote check)NessusMisc.
critical
78975RHEL 5 / 6 : IBM Java Runtime in Satellite Server (RHSA-2013:1455) (BEAST) (ROBOT)NessusRed Hat Local Security Checks
critical
76303GLSA-201406-32 : IcedTea JDK: Multiple vulnerabilities (BEAST) (ROBOT)NessusGentoo Local Security Checks
critical
75874openSUSE Security Update : java-1_6_0-sun (java-1_6_0-sun-5320) (BEAST)NessusSuSE Local Security Checks
critical
75870openSUSE Security Update : java-1_6_0-openjdk (java-1_6_0-openjdk-5329) (BEAST)NessusSuSE Local Security Checks
critical
75543openSUSE Security Update : java-1_6_0-sun (java-1_6_0-sun-5320) (BEAST)NessusSuSE Local Security Checks
critical
75539openSUSE Security Update : java-1_6_0-openjdk (java-1_6_0-openjdk-5329) (BEAST)NessusSuSE Local Security Checks
critical
69569Amazon Linux AMI : java-1.6.0-openjdk (ALAS-2011-10) (BEAST)NessusAmazon Linux Local Security Checks
critical
68373Oracle Linux 5 / 6 : java-1.6.0-openjdk (ELSA-2011-1380) (BEAST)NessusOracle Linux Local Security Checks
critical
64846Oracle Java SE Multiple Vulnerabilities (October 2011 CPU) (BEAST) (Unix)NessusMisc.
critical
62932RHEL 6 : java-1.7.0-ibm (RHSA-2012:1467) (ROBOT)NessusRed Hat Local Security Checks
critical
61158Scientific Linux Security Update : java-1.6.0-sun on SL5.x i386/x86_64 (BEAST)NessusScientific Linux Local Security Checks
critical
61156Scientific Linux Security Update : java-1.6.0-openjdk on SL5.x, SL6.x i386/x86_64 (BEAST)NessusScientific Linux Local Security Checks
critical
58302VMSA-2012-0003 : VMware VirtualCenter Update and ESX 3.5 patch update JRENessusVMware ESX Local Security Checks
critical
58164SuSE 11.1 Security Update : IBM Java 1.6.0 (SAT Patch Number 5872)NessusSuSE Local Security Checks
critical
57685Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : openjdk-6, openjdk-6b18 regression (USN-1263-2) (BEAST)NessusUbuntu Local Security Checks
critical
57658SuSE 10 Security Update : IBM Java (ZYPP Patch Number 7926) (BEAST)NessusSuSE Local Security Checks
critical
57595RHEL 5 / 6 : java-1.6.0-ibm (RHSA-2012:0034) (BEAST)NessusRed Hat Local Security Checks
critical
57499Debian DSA-2358-1 : openjdk-6 - several vulnerabilities (BEAST)NessusDebian Local Security Checks
critical
56987Debian DSA-2356-1 : openjdk-6 - several vulnerabilities (BEAST)NessusDebian Local Security Checks
critical
56860Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : icedtea-web, openjdk-6, openjdk-6b18 vulnerabilities (USN-1263-1) (BEAST)NessusUbuntu Local Security Checks
critical
56809Mandriva Linux Security Advisory : java-1.6.0-openjdk (MDVSA-2011:170)NessusMandriva Local Security Checks
critical
56749Mac OS X : Java for Mac OS X 10.7 Update 1 (BEAST)NessusMacOS X Local Security Checks
critical
56748Mac OS X : Java for Mac OS X 10.6 Update 6 (BEAST)NessusMacOS X Local Security Checks
critical
56724GLSA-201111-02 : Oracle JRE/JDK: Multiple vulnerabilities (BEAST)NessusGentoo Local Security Checks
critical
56719Fedora 16 : java-1.6.0-openjdk-1.6.0.0-60.1.10.4.fc16 (2011-15020) (BEAST)NessusFedora Local Security Checks
critical
56566Oracle Java SE Multiple Vulnerabilities (October 2011 CPU) (BEAST)NessusWindows
critical
56560RHEL 4 / 5 / 6 : java-1.6.0-sun (RHSA-2011:1384) (BEAST)NessusRed Hat Local Security Checks
critical
56558CentOS 5 : java-1.6.0-openjdk (CESA-2011:1380) (BEAST)NessusCentOS Local Security Checks
critical
56553RHEL 5 / 6 : java-1.6.0-openjdk (RHSA-2011:1380) (BEAST)NessusRed Hat Local Security Checks
critical