CVE-2012-2739
28.11.2012, 13:03
Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.Enginsight
| Vendor | Product | Version |
|---|---|---|
| oracle | jdk | 𝑥 ≤ 1.7.0 |
| oracle | jdk | 1.7.0 |
| oracle | jdk | 1.7.0 |
| oracle | jdk | 1.7.0 |
| oracle | jdk | 1.7.0 |
| oracle | jdk | 1.7.0 |
| oracle | jre | 𝑥 ≤ 1.7.0 |
| oracle | jre | 1.7.0 |
| oracle | jre | 1.7.0 |
| oracle | jre | 1.7.0 |
| oracle | jre | 1.7.0 |
| oracle | jre | 1.7.0 |
| oracle | openjdk | 𝑥 ≤ 1.7.0 |
| oracle | openjdk | 1.6.0 |
| oracle | openjdk | 1.8.0 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Ubuntu Product | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| openjdk-6 |
| ||||||||||||
| openjdk-6b18 |
| ||||||||||||
| openjdk-7 |
| ||||||||||||
| sun-java5 |
| ||||||||||||
| sun-java6 |
|
Common Weakness Enumeration
References