Unrated severityNVD Advisory· Published Jan 21, 2016· Updated May 6, 2026
CVE-2016-0402
CVE-2016-0402
Description
Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.
Affected products
70cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- osv-coords60 versionspkg:apk/chainguard/openjdk-11-openj9pkg:apk/chainguard/openjdk-11-openj9-dbgpkg:apk/chainguard/openjdk-11-openj9-default-jdkpkg:apk/chainguard/openjdk-11-openj9-default-jvmpkg:apk/chainguard/openjdk-11-openj9-default-policypkg:apk/chainguard/openjdk-11-openj9-docpkg:apk/chainguard/openjdk-11-openj9-jmodspkg:apk/chainguard/openjdk-11-openj9-jrepkg:apk/chainguard/openjdk-17-openj9pkg:apk/chainguard/openjdk-17-openj9-dbgpkg:apk/chainguard/openjdk-17-openj9-default-jdkpkg:apk/chainguard/openjdk-17-openj9-default-jvmpkg:apk/chainguard/openjdk-17-openj9-default-policypkg:apk/chainguard/openjdk-17-openj9-docpkg:apk/chainguard/openjdk-17-openj9-jmodspkg:apk/chainguard/openjdk-17-openj9-jrepkg:apk/chainguard/openjdk-21-openj9pkg:apk/chainguard/openjdk-21-openj9-dbgpkg:apk/chainguard/openjdk-21-openj9-default-jdkpkg:apk/chainguard/openjdk-21-openj9-default-jvmpkg:apk/chainguard/openjdk-21-openj9-default-policypkg:apk/chainguard/openjdk-21-openj9-docpkg:apk/chainguard/openjdk-21-openj9-jmodspkg:apk/chainguard/openjdk-21-openj9-jrepkg:apk/chainguard/openjdk-8-openj9pkg:apk/chainguard/openjdk-8-openj9-dbgpkg:apk/chainguard/openjdk-8-openj9-default-jdkpkg:apk/chainguard/openjdk-8-openj9-default-jvmpkg:apk/chainguard/openjdk-8-openj9-docpkg:apk/chainguard/openjdk-8-openj9-jrepkg:rpm/opensuse/java-1_7_0-openjdk&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/java-1_8_0-openjdk&distro=openSUSE%20Tumbleweedpkg:rpm/suse/java-1_6_0-ibm&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2012pkg:rpm/suse/java-1_6_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/java-1_6_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/java-1_7_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/java-1_7_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/java-1_7_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/java-1_7_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/java-1_7_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/java-1_7_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/java-1_7_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/java-1_7_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/java-1_7_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/java-1_7_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1
< 0.53.0-r0+ 59 more
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 1.7.0.121-1.1
- (no CPE)range: < 1.8.0.111-1.1
- (no CPE)range: < 1.6.0_sr16.20-30.1
- (no CPE)range: < 1.6.0_sr16.20-49.1
- (no CPE)range: < 1.6.0_sr16.20-51.1
- (no CPE)range: < 1.7.0_sr9.30-45.1
- (no CPE)range: < 1.7.0_sr9.30-47.1
- (no CPE)range: < 1.7.0.95-0.17.2
- (no CPE)range: < 1.7.0.95-0.17.2
- (no CPE)range: < 1.7.0.95-24.2
- (no CPE)range: < 1.7.0.95-24.2
- (no CPE)range: < 1.7.0.95-24.2
- (no CPE)range: < 1.7.0.95-24.2
- (no CPE)range: < 1.7.0.95-24.2
- (no CPE)range: < 1.7.0.95-24.2
- (no CPE)range: < 1.7.1_sr3.30-9.1
- (no CPE)range: < 1.7.1_sr3.30-21.1
- (no CPE)range: < 1.7.1_sr3.30-21.1
- (no CPE)range: < 1.7.1_sr3.30-9.1
- (no CPE)range: < 1.7.1_sr3.30-21.1
- (no CPE)range: < 1.7.1_sr3.30-21.1
- (no CPE)range: < 1.7.1_sr3.30-9.1
- (no CPE)range: < 1.7.1_sr3.30-21.1
- (no CPE)range: < 1.7.1_sr3.30-21.1
- (no CPE)range: < 1.8.0_sr2.10-7.1
- (no CPE)range: < 1.8.0_sr2.10-7.1
- (no CPE)range: < 1.8.0_sr2.10-7.1
- (no CPE)range: < 1.8.0.72-3.2
- (no CPE)range: < 1.8.0.72-3.2
- (no CPE)range: < 1.8.0.72-3.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
27- www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlnvdPatchVendor Advisory
- www.securitytracker.com/id/1034715nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2884-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2885-1nvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0049.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0050.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0053.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0054.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0055.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0056.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0057.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0067.htmlnvd
- www.debian.org/security/2016/dsa-3458nvd
- www.debian.org/security/2016/dsa-3465nvd
- www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlnvd
- www.securityfocus.com/bid/81096nvd
- access.redhat.com/errata/RHSA-2016:1430nvd
- security.gentoo.org/glsa/201603-14nvd
- security.gentoo.org/glsa/201610-08nvd
News mentions
0No linked articles in our index yet.