#VU43400 Input validation error in JavaFX


Published: 2012-10-17 | Updated: 2020-08-11

Vulnerability identifier: #VU43400

Vulnerability risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5082

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
JavaFX
Universal components / Libraries / Software for developers

Vendor: Oracle

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2 and earlier allows remote attackers to affect availability via unknown vectors. Per: http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html "Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)"

Mitigation
Install update from vendor's website.

Vulnerable software versions

JavaFX: 1.2 - 2.1


External links
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html
http://osvdb.org/86370
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
http://www.securityfocus.com/bid/56078
http://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15827


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability