Vulnerability Name:

CVE-2011-0872 (CCN-67928)

Assigned:2011-06-07
Published:2011-06-07
Updated:2017-12-22
Summary:Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect availability via unknown vectors related to NIO.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2011-0872

Source: CCN
Type: HP Security Bulletin HPSBMU02769 SSRT100846
HP Systems Insight Manager (SIM) for HP-UX, Linux, and Windows, Remote Unauthorized Access, Execution of Arbitrary Code, and Other Vulnerabilities

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2011:0633

Source: SUSE
Type: UNKNOWN
SUSE-SA:2011:030

Source: SUSE
Type: UNKNOWN
SUSE-SU-2011:0807

Source: SUSE
Type: UNKNOWN
SUSE-SU-2011:0863

Source: SUSE
Type: UNKNOWN
SUSE-SA:2011:032

Source: SUSE
Type: UNKNOWN
SUSE-SA:2011:036

Source: SUSE
Type: UNKNOWN
SUSE-SU-2011:0966

Source: HP
Type: UNKNOWN
SSRT100591

Source: HP
Type: UNKNOWN
HPSBMU02799

Source: HP
Type: UNKNOWN
SSRT100867

Source: CCN
Type: SA44784
Sun Java JDK / JRE / SDK Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
44930

Source: CCN
Type: SA45206
IBM Java Multiple Vulnerabilities

Source: CCN
Type: SA45245
Hitachi Cosminexus Products Java Multiple Vulnerabilities

Source: GENTOO
Type: UNKNOWN
GLSA-201406-32

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/css/P8/documents/100147041

Source: CONFIRM
Type: UNKNOWN
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-015/index.html

Source: CCN
Type: Hitachi Security Vulnerability Information HS11-015
Cosminexus

Source: CCN
Type: IBM Web site
Oracle June 7 2011 CPU

Source: CONFIRM
Type: UNKNOWN
http://www.ibm.com/developerworks/java/jdk/alerts/

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html

Source: CCN
Type: Oracle Java SE Critical Patch Update Advisory - June 2011
Oracle Java SE Critical Patch Update Advisory - June 2011

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html

Source: CCN
Type: OSVDB ID: 73082
Oracle Java SE / JRE NIO Unspecified Remote DoS

Source: CCN
Type: BID-48141
Oracle Java SE and Java for Business CVE-2011-0872 Remote Java Runtime Environment Vulnerability

Source: CERT
Type: US Government Resource
TA11-201A

Source: XF
Type: UNKNOWN
javase-jre-nio-unspecified(67928)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:14241

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:14915

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sun:jdk:1.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_23:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_24:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:*:update_25:*:*:*:*:*:* (Version <= 1.6.0)
  • OR cpe:/a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_22:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_23:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_24:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:update_25:*:*:*:*:*:* (Version <= 1.6.0)
  • OR cpe:/a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_7:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:hp:systems_insight_manager:4.2:sp1:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:4.2:sp2:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.0:sp3:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.0:sp5:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.3:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.3:update_1:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:6.3:*:*:*:*:*:*:*
  • AND
  • cpe:/a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:processing_kit_for_xml:01-00:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_client:06-70-/f:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_operator:07-00-05:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:java:6.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_developer:6:-:standard:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20110872
    V
    CVE-2011-0872
    2022-05-20
    oval:org.mitre.oval:def:14915
    V
    HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
    2015-04-20
    oval:org.mitre.oval:def:14241
    V
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect availability via unknown vectors related to NIO.
    2014-08-18
    oval:org.mitre.oval:def:14114
    P
    USN-1154-1 -- openjdk-6, openjdk-6b18 vulnerabilities
    2014-06-30
    BACK
    sun jdk 1.6.0
    sun jdk 1.6.0 update1
    sun jdk 1.6.0 update2
    sun jdk 1.6.0 update_10
    sun jdk 1.6.0 update_11
    sun jdk 1.6.0 update_12
    sun jdk 1.6.0 update_13
    sun jdk 1.6.0 update_14
    sun jdk 1.6.0 update_15
    sun jdk 1.6.0 update_16
    sun jdk 1.6.0 update_17
    sun jdk 1.6.0 update_18
    sun jdk 1.6.0 update_19
    sun jdk 1.6.0 update_20
    sun jdk 1.6.0 update_21
    sun jdk 1.6.0 update_22
    sun jdk 1.6.0 update_23
    sun jdk 1.6.0 update_24
    sun jdk * update_25
    sun jdk 1.6.0 update_3
    sun jdk 1.6.0 update_4
    sun jdk 1.6.0 update_5
    sun jdk 1.6.0 update_6
    sun jdk 1.6.0 update_7
    sun jre 1.6.0
    sun jre 1.6.0 update_1
    sun jre 1.6.0 update_10
    sun jre 1.6.0 update_11
    sun jre 1.6.0 update_12
    sun jre 1.6.0 update_13
    sun jre 1.6.0 update_14
    sun jre 1.6.0 update_15
    sun jre 1.6.0 update_16
    sun jre 1.6.0 update_17
    sun jre 1.6.0 update_18
    sun jre 1.6.0 update_19
    sun jre 1.6.0 update_2
    sun jre 1.6.0 update_20
    sun jre 1.6.0 update_21
    sun jre 1.6.0 update_22
    sun jre 1.6.0 update_23
    sun jre 1.6.0 update_24
    sun jre * update_25
    sun jre 1.6.0 update_3
    sun jre 1.6.0 update_4
    sun jre 1.6.0 update_5
    sun jre 1.6.0 update_6
    sun jre 1.6.0 update_7
    hp systems insight manager 4.2 sp1
    hp systems insight manager 4.2 sp2
    hp systems insight manager 5.0 sp1
    hp systems insight manager 5.0 sp2
    hp systems insight manager 5.0 sp3
    hp systems insight manager 5.0 sp5
    hp systems insight manager 4.0
    hp systems insight manager 5.0
    hp systems insight manager 5.3
    hp systems insight manager 5.3 update_1
    hp systems insight manager 6.0
    hp systems insight manager 6.1
    hp systems insight manager 6.2
    hp systems insight manager 6.3
    hitachi ucosminexus service architect *
    hitachi processing kit for xml 01-00
    hitachi ucosminexus client 06-70-/f
    hitachi ucosminexus operator 07-00-05
    hitachi ucosminexus service platform *
    ibm java 6.0.0.0
    hitachi ucosminexus developer 6 -