CVE-2012-4822 : Detail

CVE-2012-4822

87.28%V3
Network
2013-01-10
23h00 +00:00
2017-08-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes & Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allow remote attackers to execute arbitrary code via vectors related to "insecure use [of] multiple methods in the java.lang.class class."

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE Other No informations.

Metrics

Metrics Score Severity CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Ibm>>Java >> Version From (including) 1.4.2 To (including) 1.4.2.13.13

Ibm>>Java >> Version From (including) 5.0.0.0 To (including) 5.0.14.0

Ibm>>Java >> Version From (including) 6.0.0.0 To (including) 6.0.11.0

Ibm>>Java >> Version From (including) 7.0.0.0 To (including) 7.0.2.0

Ibm>>Lotus_domino >> Version 8.0

Ibm>>Lotus_domino >> Version 8.0.1

Ibm>>Lotus_domino >> Version 8.0.2

Ibm>>Lotus_domino >> Version 8.0.2.1

Ibm>>Lotus_domino >> Version 8.0.2.2

Ibm>>Lotus_domino >> Version 8.0.2.3

Ibm>>Lotus_domino >> Version 8.0.2.4

Ibm>>Lotus_domino >> Version 8.5.0

Ibm>>Lotus_domino >> Version 8.5.0.1

Ibm>>Lotus_domino >> Version 8.5.1

Ibm>>Lotus_domino >> Version 8.5.1.1

Ibm>>Lotus_domino >> Version 8.5.1.2

Ibm>>Lotus_domino >> Version 8.5.1.3

Ibm>>Lotus_domino >> Version 8.5.1.4

Ibm>>Lotus_domino >> Version 8.5.1.5

Ibm>>Lotus_domino >> Version 8.5.2.0

Ibm>>Lotus_domino >> Version 8.5.2.1

Ibm>>Lotus_domino >> Version 8.5.2.2

Ibm>>Lotus_domino >> Version 8.5.2.3

Ibm>>Lotus_domino >> Version 8.5.2.4

Ibm>>Lotus_domino >> Version 8.5.3.0

Ibm>>Lotus_domino >> Version 8.5.3.1

Ibm>>Lotus_domino >> Version 8.5.3.2

Ibm>>Lotus_notes >> Version 8.0

Ibm>>Lotus_notes >> Version 8.0.0

Ibm>>Lotus_notes >> Version 8.0.1

Ibm>>Lotus_notes >> Version 8.0.2

Ibm>>Lotus_notes >> Version 8.0.2.0

Ibm>>Lotus_notes >> Version 8.0.2.1

Ibm>>Lotus_notes >> Version 8.0.2.2

Ibm>>Lotus_notes >> Version 8.0.2.3

Ibm>>Lotus_notes >> Version 8.0.2.4

Ibm>>Lotus_notes >> Version 8.0.2.5

Ibm>>Lotus_notes >> Version 8.0.2.6

Ibm>>Lotus_notes >> Version 8.5

Ibm>>Lotus_notes >> Version 8.5.0.0

Ibm>>Lotus_notes >> Version 8.5.0.1

Ibm>>Lotus_notes >> Version 8.5.1

Ibm>>Lotus_notes >> Version 8.5.1.0

Ibm>>Lotus_notes >> Version 8.5.1.1

Ibm>>Lotus_notes >> Version 8.5.1.2

Ibm>>Lotus_notes >> Version 8.5.1.3

Ibm>>Lotus_notes >> Version 8.5.1.4

Ibm>>Lotus_notes >> Version 8.5.1.5

Ibm>>Lotus_notes >> Version 8.5.2.0

Ibm>>Lotus_notes >> Version 8.5.2.1

Ibm>>Lotus_notes >> Version 8.5.2.2

Ibm>>Lotus_notes >> Version 8.5.2.3

Ibm>>Lotus_notes >> Version 8.5.3

Ibm>>Lotus_notes >> Version 8.5.3.1

Ibm>>Lotus_notes >> Version 8.5.3.2

Ibm>>Lotus_notes >> Version 8.5.4

Ibm>>Lotus_notes_sametime >> Version 8.0.80407

Ibm>>Lotus_notes_sametime >> Version 8.0.80822

Ibm>>Lotus_notes_sametime >> Version 8.5.1.20100709-1631

Ibm>>Lotus_notes_traveler >> Version 8.0

Ibm>>Lotus_notes_traveler >> Version 8.0.1

Ibm>>Lotus_notes_traveler >> Version 8.0.1.2

Ibm>>Lotus_notes_traveler >> Version 8.0.1.3

Ibm>>Lotus_notes_traveler >> Version 8.5.0.0

Ibm>>Lotus_notes_traveler >> Version 8.5.0.1

Ibm>>Lotus_notes_traveler >> Version 8.5.0.2

Ibm>>Lotus_notes_traveler >> Version 8.5.1.1

Ibm>>Lotus_notes_traveler >> Version 8.5.1.2

Ibm>>Lotus_notes_traveler >> Version 8.5.1.3

Ibm>>Lotus_notes_traveler >> Version 8.5.2.1

Ibm>>Lotus_notes_traveler >> Version 8.5.3

Ibm>>Lotus_notes_traveler >> Version 8.5.3.1

Ibm>>Lotus_notes_traveler >> Version 8.5.3.2

Ibm>>Lotus_notes_traveler >> Version 8.5.3.3

Ibm>>Lotus_notes_traveler >> Version 8.5.3.3

Ibm>>Rational_change >> Version 4.7

Ibm>>Rational_change >> Version 5.1

Ibm>>Rational_change >> Version 5.2

Ibm>>Rational_change >> Version 5.3

Ibm>>Rational_host_on-demand >> Version 1.6.0.12

Ibm>>Rational_host_on-demand >> Version 8.0.8.0

Ibm>>Rational_host_on-demand >> Version 9.0.8.0

Ibm>>Rational_host_on-demand >> Version 10.0.9.0

Ibm>>Rational_host_on-demand >> Version 10.0.10.0

Ibm>>Rational_host_on-demand >> Version 11.0.3.0

Ibm>>Rational_host_on-demand >> Version 11.0.4.0

Ibm>>Rational_host_on-demand >> Version 11.0.5.0

Ibm>>Rational_host_on-demand >> Version 11.0.5.1

Ibm>>Rational_host_on-demand >> Version 11.0.6.0

Ibm>>Rational_host_on-demand >> Version 11.0.6.1

Ibm>>Service_delivery_manager >> Version 7.2.1.0

Ibm>>Service_delivery_manager >> Version 7.2.2.0

Ibm>>Smart_analytics_system_5600_software >> Version -

Ibm>>Smart_analytics_system_5600_software >> Version 9.7

Ibm>>Tivoli_monitoring >> Version 6.1.0

Ibm>>Tivoli_monitoring >> Version 6.1.0.7

Ibm>>Tivoli_monitoring >> Version 6.2.0

Ibm>>Tivoli_monitoring >> Version 6.2.0.1

Ibm>>Tivoli_monitoring >> Version 6.2.0.2

Ibm>>Tivoli_monitoring >> Version 6.2.0.3

Ibm>>Tivoli_monitoring >> Version 6.2.1

Ibm>>Tivoli_monitoring >> Version 6.2.1.0

Ibm>>Tivoli_monitoring >> Version 6.2.1.1

Ibm>>Tivoli_monitoring >> Version 6.2.1.2

Ibm>>Tivoli_monitoring >> Version 6.2.1.3

Ibm>>Tivoli_monitoring >> Version 6.2.1.4

Ibm>>Tivoli_monitoring >> Version 6.2.2

Ibm>>Tivoli_monitoring >> Version 6.2.2.0

Ibm>>Tivoli_monitoring >> Version 6.2.2.1

Ibm>>Tivoli_monitoring >> Version 6.2.2.2

Ibm>>Tivoli_monitoring >> Version 6.2.2.3

Ibm>>Tivoli_monitoring >> Version 6.2.2.4

Ibm>>Tivoli_monitoring >> Version 6.2.2.5

Ibm>>Tivoli_monitoring >> Version 6.2.2.6

Ibm>>Tivoli_monitoring >> Version 6.2.2.7

Ibm>>Tivoli_monitoring >> Version 6.2.2.8

Ibm>>Tivoli_monitoring >> Version 6.2.2.9

Ibm>>Tivoli_monitoring >> Version 6.2.3

Ibm>>Tivoli_monitoring >> Version 6.2.3.0

Ibm>>Tivoli_monitoring >> Version 6.2.3.1

Ibm>>Tivoli_monitoring >> Version 6.2.3.2

Ibm>>Tivoli_remote_control >> Version 5.1.2

Ibm>>Websphere_real_time >> Version 2.0

Ibm>>Websphere_real_time >> Version 3.0

Tivoli_storage_productivity_center>>5.0 >> Version *

Tivoli_storage_productivity_center>>5.1 >> Version *

Tivoli_storage_productivity_center>>5.1.1 >> Version *

Ibm>>Smart_analytics_system_5600 >> Version 7200

References

http://rhn.redhat.com/errata/RHSA-2012-1466.html
Tags : vendor-advisory, x_refsource_REDHAT
http://seclists.org/bugtraq/2012/Sep/38
Tags : mailing-list, x_refsource_BUGTRAQ
http://rhn.redhat.com/errata/RHSA-2013-1455.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www-01.ibm.com/support/docview.wss?uid=swg1IV29665
Tags : vendor-advisory, x_refsource_AIXAPAR
http://www.securityfocus.com/bid/55495
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/51327
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2012-1467.html
Tags : vendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2012-1465.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/51328
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/51634
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2013-1456.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/51393
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/51326
Tags : third-party-advisory, x_refsource_SECUNIA