CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
94.7%
Issue Overview:
Two improper permission check issues were discovered in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions.
Affected Packages:
java-1.7.0-openjdk
Issue Correction:
Run yum update java-1.7.0-openjdk to update your system.
New Packages:
i686:
java-1.7.0-openjdk-src-1.7.0.9-2.3.4.1.15.amzn1.i686
java-1.7.0-openjdk-1.7.0.9-2.3.4.1.15.amzn1.i686
java-1.7.0-openjdk-demo-1.7.0.9-2.3.4.1.15.amzn1.i686
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.4.1.15.amzn1.i686
java-1.7.0-openjdk-devel-1.7.0.9-2.3.4.1.15.amzn1.i686
noarch:
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.4.1.15.amzn1.noarch
src:
java-1.7.0-openjdk-1.7.0.9-2.3.4.1.15.amzn1.src
x86_64:
java-1.7.0-openjdk-src-1.7.0.9-2.3.4.1.15.amzn1.x86_64
java-1.7.0-openjdk-1.7.0.9-2.3.4.1.15.amzn1.x86_64
java-1.7.0-openjdk-devel-1.7.0.9-2.3.4.1.15.amzn1.x86_64
java-1.7.0-openjdk-demo-1.7.0.9-2.3.4.1.15.amzn1.x86_64
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.4.1.15.amzn1.x86_64
Red Hat: CVE-2012-3174
Mitre: CVE-2012-3174