Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.
References
Link Resource
http://crypto.stanford.edu/dns/dns-rebinding.pdf
http://dev2dev.bea.com/pub/advisory/272
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html
http://osvdb.org/45527
http://seclists.org/fulldisclosure/2007/Jul/0159.html
http://secunia.com/advisories/27206 Vendor Advisory
http://secunia.com/advisories/27261 Vendor Advisory
http://secunia.com/advisories/27693 Vendor Advisory
http://secunia.com/advisories/27716 Vendor Advisory
http://secunia.com/advisories/27804 Vendor Advisory
http://secunia.com/advisories/28777 Vendor Advisory
http://secunia.com/advisories/28880 Vendor Advisory
http://secunia.com/advisories/29042 Vendor Advisory
http://secunia.com/advisories/29214 Vendor Advisory
http://secunia.com/advisories/29340 Vendor Advisory
http://secunia.com/advisories/29858 Vendor Advisory
http://secunia.com/advisories/29897 Vendor Advisory
http://secunia.com/advisories/30780 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200804-28.xml
http://securitytracker.com/id?1018771 Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103078-1 Patch Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200041-1 Vendor Advisory
http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html
http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml
http://www.novell.com/linux/security/advisories/2007_55_java.html
http://www.redhat.com/support/errata/RHSA-2007-0963.html
http://www.redhat.com/support/errata/RHSA-2007-1041.html
http://www.redhat.com/support/errata/RHSA-2008-0100.html
http://www.redhat.com/support/errata/RHSA-2008-0132.html
http://www.redhat.com/support/errata/RHSA-2008-0156.html
http://www.securityfocus.com/archive/1/482926/100/0/threaded
http://www.securityfocus.com/bid/25918
http://www.vupen.com/english/advisories/2007/3895 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0609 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10340
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2007-10-08T23:00:00

Updated: 2018-10-15T20:57:01

Reserved: 2007-10-08T00:00:00


Link: CVE-2007-5273

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2007-10-08T23:17:00.000

Modified: 2018-10-30T16:26:24.187


Link: CVE-2007-5273

JSON object: View

cve-icon Redhat Information

No data.