First published: Thu May 03 2012(Updated: )
Unspecified vulnerability in the Oracle JRockit component in Oracle Fusion Middleware 28.2.2 and earlier, and JDK/JRE 5 and 6 27.7.1 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Fusion Middleware | <=28.2.2 | |
Oracle Fusion Middleware | =7.5.2 | |
Oracle Fusion Middleware | =8.3.2.0 | |
Oracle Fusion Middleware | =8.3.5.0 | |
Oracle Fusion Middleware | =9.2.4 | |
Oracle Fusion Middleware | =10.0.2 | |
Oracle Fusion Middleware | =10.1 | |
Oracle Fusion Middleware | =10.1.2.3 | |
Oracle Fusion Middleware | =10.1.3.3.2 | |
Oracle Fusion Middleware | =10.1.3.4.1 | |
Oracle Fusion Middleware | =10.1.3.5 | |
Oracle Fusion Middleware | =10.1.3.5.1 | |
Oracle Fusion Middleware | =10.1.4.3 | |
Oracle Fusion Middleware | =10.3.3 | |
Oracle Fusion Middleware | =10.3.4 | |
Oracle Fusion Middleware | =10.3.5 | |
Oracle Fusion Middleware | =11.1 | |
Oracle Fusion Middleware | =11.1.1 | |
Oracle Fusion Middleware | =11.1.1.1.0 | |
Oracle Fusion Middleware | =11.1.1.2.0 | |
Oracle Fusion Middleware | =11.1.1.3.0 | |
Oracle Fusion Middleware | =11.1.1.4.0 | |
Oracle Fusion Middleware | =11.1.1.5.0 | |
Sun JDK | =5.0 | |
Sun JDK | =6 | |
Sun JRE | =5.0 | |
Sun JRE | =6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1695 is considered to have a high severity level due to its potential impact on confidentiality, integrity, and availability.
To fix CVE-2012-1695, users should apply the latest patches provided by Oracle for the affected versions of Oracle Fusion Middleware and JDK/JRE.
CVE-2012-1695 affects Oracle Fusion Middleware versions up to 28.2.2, as well as several specific versions including 7.5.2, 8.3.2.0, and 10.3.5.
CVE-2012-1695 impacts Sun JDK 5.0 and 6, as well as Sun JRE 5.0 and 6.
Yes, CVE-2012-1695 can be exploited remotely, posing a risk to systems running the vulnerable software.