First published: Thu Jul 21 2016(Updated: )
Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows local users to affect integrity via vectors related to Networking.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java SE 7 | =1.6.0-update115 | |
Oracle Java SE 7 | =1.7.0-update101 | |
Oracle Java SE 7 | =1.8.0-update91 | |
Oracle Java SE 7 | =1.8.0-update92 | |
Oracle JRE | =1.6.0-update115 | |
Oracle JRE | =1.7.0-update101 | |
Oracle JRE | =1.8.0-update91 | |
Oracle JRE | =1.8.0-update92 | |
Oracle Java SE | =r28.3.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3485 is classified as a medium severity vulnerability, affecting the integrity of the Oracle Java SE and JRockit environments.
To mitigate CVE-2016-3485, it's recommended to upgrade to the latest version of Oracle Java SE or JRockit that has addressed this vulnerability.
CVE-2016-3485 affects Oracle Java SE versions 6u115, 7u101, 8u91, and 8u92, as well as JRockit R28.3.10.
As of now, there are no publicly known exploits specifically targeting CVE-2016-3485.
The potential impact of CVE-2016-3485 includes unauthorized access and data integrity issues due to vulnerabilities in the Networking component.