Critical severity9.8CISA KEVNVD Advisory· Published Jun 16, 2012· Updated Apr 21, 2026
CVE-2012-1723
CVE-2012-1723
Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
Affected products
135cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*+ 63 more
- cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*range: <=1.4.2_37
- cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update32_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update32_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*+ 61 more
- cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*range: <=1.4.2_37
- cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- rhn.redhat.com/errata/RHSA-2012-0734.htmlnvdThird Party Advisory
- security.gentoo.org/glsa/glsa-201406-32.xmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.htmlnvdVendor Advisory
- www.securityfocus.com/bid/53960nvdBroken LinkThird Party AdvisoryVDB Entry
- mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.htmlnvdMailing List
- marc.infonvdMailing List
- secunia.com/advisories/51080nvdBroken Link
- www.ibm.com/support/docview.wssnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259nvdBroken Link
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.