vulnerability
CentOS: (CVE-2016-0483) (Multiple Advisories): java-1.6.0-openjdk
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | 2016-01-20 | 2016-07-06 | 2025-02-18 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
2016-01-20
Added
2016-07-06
Modified
2025-02-18
Description
Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.
Solution(s)
centos-upgrade-java-1-6-0-openjdkcentos-upgrade-java-1-6-0-openjdk-democentos-upgrade-java-1-6-0-openjdk-develcentos-upgrade-java-1-6-0-openjdk-javadoccentos-upgrade-java-1-6-0-openjdk-srccentos-upgrade-java-1-7-0-openjdkcentos-upgrade-java-1-7-0-openjdk-accessibilitycentos-upgrade-java-1-7-0-openjdk-democentos-upgrade-java-1-7-0-openjdk-develcentos-upgrade-java-1-7-0-openjdk-headlesscentos-upgrade-java-1-7-0-openjdk-javadoccentos-upgrade-java-1-7-0-openjdk-srccentos-upgrade-java-1-8-0-openjdkcentos-upgrade-java-1-8-0-openjdk-accessibilitycentos-upgrade-java-1-8-0-openjdk-accessibility-debugcentos-upgrade-java-1-8-0-openjdk-debugcentos-upgrade-java-1-8-0-openjdk-democentos-upgrade-java-1-8-0-openjdk-demo-debugcentos-upgrade-java-1-8-0-openjdk-develcentos-upgrade-java-1-8-0-openjdk-devel-debugcentos-upgrade-java-1-8-0-openjdk-headlesscentos-upgrade-java-1-8-0-openjdk-headless-debugcentos-upgrade-java-1-8-0-openjdk-javadoccentos-upgrade-java-1-8-0-openjdk-javadoc-debugcentos-upgrade-java-1-8-0-openjdk-srccentos-upgrade-java-1-8-0-openjdk-src-debug

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.