CVE-2007-5273
Published: 8 October 2007
Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.
Priority
Status
Package | Release | Status |
---|---|---|
sun-java5 Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
edgy |
Ignored
(end of life, was needed)
|
|
feisty |
Ignored
(end of life, was needed)
|
|
gutsy |
Released
(1.5.0-13-0ubuntu1)
|
|
hardy |
Released
(1.5.0-13-0ubuntu1)
|
|
intrepid |
Released
(1.5.0-13-0ubuntu1)
|
|
jaunty |
Released
(1.5.0-13-0ubuntu1)
|
|
karmic |
Does not exist
|
|
upstream |
Released
(5.0 Update 13)
|
|
sun-java6 Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
edgy |
Does not exist
|
|
feisty |
Ignored
(end of life, was needed)
|
|
gutsy |
Released
(6-03-0ubuntu2)
|
|
hardy |
Released
(6-03-0ubuntu2)
|
|
intrepid |
Released
(6-03-0ubuntu2)
|
|
jaunty |
Released
(6-03-0ubuntu2)
|
|
karmic |
Released
(6-03-0ubuntu2)
|
|
upstream |
Released
(6 Update 3)
|