lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <57041F3E.7090500@security-explorations.com> Date: Tue, 05 Apr 2016 22:25:34 +0200 From: Security Explorations <contact@...urity-explorations.com> To: bugtraq@...urityfocus.com, fulldisclosure@...lists.org Subject: Re: [FD] [SE-2012-01] Broken security fix in IBM Java 7/8 Hello All, I should have included the following information in my original post: 1) Issue 67 was assigned CVE-2013-3009 [1], 2) it originally affected IBM Java from versions 1.4 to 7 [2], 3) CVE-ID corresponding to a broken patch will likely not reflect the original issue. This was the case for IBM's Issue 49 (CVE-2012-4823) and two of its broken fixes (CVE-2013-3012 and CVE-2013-5458). 4) Incomplete patch for Issue 67 may affect IBM Notes / Domino, Websphere, Tivoli and other IBM products incorporating vulnerable IBM JRE (source: IBM Security Bulletins where CVE-2013-3009 identifier strings appears). Thank you. -- Best Regards, Adam Gowdiak --------------------------------------------- Security Explorations http://www.security-explorations.com "We bring security research to the new level" --------------------------------------------- References: [1] Multiple vulnerabilities in the IBM i Java SDK https://www-304.ibm.com/support/docview.wss?uid=nas8N1019760 [2] PM91727: FIX SECURITY VULNERABILITY CVE-2013-3009 http://www-01.ibm.com/support/docview.wss?uid=swg1PM91727 _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists