Versio.io

CVE-2014-6587

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 20-01-2015 01:00
Last modified: - 20-01-2015 01:00
Total changes: - 116

Description

CVE-2014-6587 OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264)

Common Vulnerability Scoring System (CVSS)

AV:L/AC:M/Au:S/C:P/I:P/A:P
Low
Attack complexity
Local
Attack vector
Low
Availability
Low
Confidentiality
Low
Integrity
-
Privileges required
-
Scope
-
User interaction
4.1
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=java-1.7.0-oracle-1 AND versionEndExcluding=1.7.0.75-1jpp.1.el5_11
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=5
AND
product=java-1.6.0-sun-1 AND versionEndExcluding=1.6.0.91-1jpp.1.el5_11
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=5
AND
product=java-1.7.0-oracle-1 AND versionEndExcluding=1.7.0.75-1jpp.1.el6
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=6
AND
product=java-1.8.0-oracle-1 AND versionEndExcluding=1.8.0.31-1jpp.1.el6
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=6
AND
product=java-1.6.0-sun-1 AND versionEndExcluding=1.6.0.91-1jpp.1.el6
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=6
AND
product=java-1.7.0-oracle-1 AND versionEndExcluding=1.7.0.75-1jpp.2.el7
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=7
AND
product=java-1.6.0-sun-1 AND versionEndExcluding=1.6.0.91-1jpp.1.el7
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=7
AND
product=java-1.7.0-openjdk-1 AND versionEndExcluding=1.7.0.75-2.5.4.0.el5_11
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=java-1.6.0-openjdk-1 AND versionEndExcluding=1.6.0.34-1.13.6.1.el5_11
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=java-1.7.0-ibm-1 AND versionEndExcluding=1.7.0.8.10-1jpp.4.el5
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=5
AND
product=java-1.6.0-ibm-1 AND versionEndExcluding=1.6.0.16.3-1jpp.1.el5
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=5
AND
product=java-1.7.0-openjdk-1 AND versionEndExcluding=1.7.0.75-2.5.4.0.el6_6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
AND
product=java-1.8.0-openjdk-1 AND versionEndExcluding=1.8.0.31-1.b13.el6_6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
AND
product=java-1.6.0-openjdk-1 AND versionEndExcluding=1.6.0.34-1.13.6.1.el6_6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
AND
product=java-1.7.0-openjdk-1 AND versionEndExcluding=1.7.0.75-2.5.4.2.el7_0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=7
AND
product=java-1.6.0-openjdk-1 AND versionEndExcluding=1.6.0.34-1.13.6.1.el7_0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=7
AND
product=java-1.6.0-ibm-1 AND versionEndExcluding=1.6.0.16.3-1jpp.1.el5
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.6
AND
product=java-1.6.0-ibm-1 AND versionEndExcluding=1.6.0.16.3-1jpp.1.el6
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.7
AND
product=java-1.7.1-ibm-1 AND versionEndExcluding=1.7.1.2.10-1jpp.3.el6_6
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=6
AND
product=java-1.6.0-ibm-1 AND versionEndExcluding=1.6.0.16.3-1jpp.1.el6_6
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=6
AND
product=java-1.7.1-ibm-1 AND versionEndExcluding=1.7.1.2.10-1jpp.3.el7_0
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=7
 

Reference

 


Keywords

REDHAT

 

CVE-2014-6587

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.