First published: Wed Oct 17 2012(Updated: )
Multiple unspecified vulnerabilities in the Oracle JRockit component in Oracle Fusion Middleware 28.2.4 and earlier, and 27.7.3 and earlier, when using JDK/JRE 5 or 6, allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: this overlaps CVE-2012-5083, CVE-2012-1531, CVE-2012-5081, and CVE-2012-5085.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
BEA JRockit | >=r27.7.0<=r27.7.3 | |
BEA JRockit | >=r28.2.0<=r28.2.4 | |
Sun JDK | =1.5.0 | |
Sun JDK | =1.6.0 | |
Sun JRE | =1.5.0 | |
Sun JRE | =1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-3202 is considered high due to its potential impact on confidentiality, integrity, and availability.
To fix CVE-2012-3202, you should upgrade Oracle JRockit to a version later than 27.7.3 and 28.2.4.
CVE-2012-3202 affects Oracle JRockit versions 27.7.3 and earlier, and 28.2.4 and earlier.
Yes, remote attackers can exploit CVE-2012-3202 through unspecified vectors.
CVE-2012-3202 involves the Oracle JRockit component within Oracle Fusion Middleware.