CVE-2012-2739
28.11.2012, 13:03
Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.Enginsight
Vendor | Product | Version |
---|---|---|
oracle | jdk | 𝑥 ≤ 1.7.0 |
oracle | jdk | 1.7.0 |
oracle | jdk | 1.7.0 |
oracle | jdk | 1.7.0 |
oracle | jdk | 1.7.0 |
oracle | jdk | 1.7.0 |
oracle | jre | 𝑥 ≤ 1.7.0 |
oracle | jre | 1.7.0 |
oracle | jre | 1.7.0 |
oracle | jre | 1.7.0 |
oracle | jre | 1.7.0 |
oracle | jre | 1.7.0 |
oracle | openjdk | 𝑥 ≤ 1.7.0 |
oracle | openjdk | 1.6.0 |
oracle | openjdk | 1.8.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
openjdk-6 |
| ||||||||||||
openjdk-6b18 |
| ||||||||||||
openjdk-7 |
| ||||||||||||
sun-java5 |
| ||||||||||||
sun-java6 |
|
Common Weakness Enumeration
References