// For flags

CVE-2014-0453

OpenJDK: RSA unpadding timing issues (Security, 8027766)

Severity Score

4.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.

Vulnerabilidad no especificada en Oracle Java SE 5.0u61, 6u71, 7u51, y 8; JRockit R27.8.1 y R28.3.1; y Java SE Embedded 7u51 permite a atacantes remotos afectar la confidencialidad y la integridad a través de vectores desconocidos relacionados con la seguridad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-12-12 CVE Reserved
  • 2014-04-16 CVE Published
  • 2023-11-26 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (64)
URL Tag Source
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 Third Party Advisory
http://secunia.com/advisories/58415 Third Party Advisory
http://secunia.com/advisories/59022 Third Party Advisory
http://secunia.com/advisories/59023 Third Party Advisory
http://secunia.com/advisories/59071 Third Party Advisory
http://secunia.com/advisories/59082 Third Party Advisory
http://secunia.com/advisories/59104 Third Party Advisory
http://secunia.com/advisories/59194 Third Party Advisory
http://secunia.com/advisories/59250 Third Party Advisory
http://secunia.com/advisories/59255 Third Party Advisory
http://secunia.com/advisories/59307 Third Party Advisory
http://secunia.com/advisories/59324 Third Party Advisory
http://secunia.com/advisories/59436 Third Party Advisory
http://secunia.com/advisories/59438 Third Party Advisory
http://secunia.com/advisories/59653 Third Party Advisory
http://secunia.com/advisories/59675 Third Party Advisory
http://secunia.com/advisories/59722 Third Party Advisory
http://secunia.com/advisories/59733 Third Party Advisory
http://secunia.com/advisories/60003 Third Party Advisory
http://secunia.com/advisories/60111 Third Party Advisory
http://secunia.com/advisories/60117 Third Party Advisory
http://secunia.com/advisories/60498 Third Party Advisory
http://secunia.com/advisories/60574 Third Party Advisory
http://secunia.com/advisories/60580 Third Party Advisory
http://secunia.com/advisories/61050 Third Party Advisory
http://secunia.com/advisories/61264 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21672080 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21673836 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21674539 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21675945 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676190 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676373 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676672 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676703 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21677294 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21678113 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21679610 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21679713 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21680387 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21680750 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21681018 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21681047 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21681256 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21683484 Broken Link
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096132 Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21675343 Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21675588 Broken Link
http://www.ibm.com/support/docview.wss?uid=swg21677387 Third Party Advisory
http://www.securityfocus.com/bid/66914 Third Party Advisory
https://www.ibm.com/support/docview.wss?uid=swg21674530 Third Party Advisory
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ibm
Search vendor "Ibm"
Forms Viewer
Search vendor "Ibm" for product "Forms Viewer"
>= 4.0.0 < 4.0.0.3
Search vendor "Ibm" for product "Forms Viewer" and version " >= 4.0.0 < 4.0.0.3"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Ibm
Search vendor "Ibm"
Forms Viewer
Search vendor "Ibm" for product "Forms Viewer"
>= 8.0.0 < 8.0.1.1
Search vendor "Ibm" for product "Forms Viewer" and version " >= 8.0.0 < 8.0.1.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Oracle
Search vendor "Oracle"
Jrockit
Search vendor "Oracle" for product "Jrockit"
r27.8.1
Search vendor "Oracle" for product "Jrockit" and version "r27.8.1"
-
Affected
Oracle
Search vendor "Oracle"
Jrockit
Search vendor "Oracle" for product "Jrockit"
r28.3.1
Search vendor "Oracle" for product "Jrockit" and version "r28.3.1"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
10.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
13.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "13.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04"
esm
Affected
Juniper
Search vendor "Juniper"
Junos Space
Search vendor "Juniper" for product "Junos Space"
< 15.1
Search vendor "Juniper" for product "Junos Space" and version " < 15.1"
-
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.5.0
Search vendor "Oracle" for product "Jdk" and version "1.5.0"
update61
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.6.0
Search vendor "Oracle" for product "Jdk" and version "1.6.0"
update71
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.7.0
Search vendor "Oracle" for product "Jdk" and version "1.7.0"
update51
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.8.0
Search vendor "Oracle" for product "Jdk" and version "1.8.0"
-
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.5.0
Search vendor "Oracle" for product "Jre" and version "1.5.0"
update61
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.6.0
Search vendor "Oracle" for product "Jre" and version "1.6.0"
update71
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.7.0
Search vendor "Oracle" for product "Jre" and version "1.7.0"
update51
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.8.0
Search vendor "Oracle" for product "Jre" and version "1.8.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
6.0
Search vendor "Debian" for product "Debian Linux" and version "6.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
7.0
Search vendor "Debian" for product "Debian Linux" and version "7.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected