Low severity3.1NVD Advisory· Published Apr 21, 2016· Updated May 6, 2026
CVE-2016-3426
CVE-2016-3426
Description
Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
Affected products
61- cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
- osv-coords59 versionspkg:apk/chainguard/openjdk-11-openj9pkg:apk/chainguard/openjdk-11-openj9-dbgpkg:apk/chainguard/openjdk-11-openj9-default-jdkpkg:apk/chainguard/openjdk-11-openj9-default-jvmpkg:apk/chainguard/openjdk-11-openj9-default-policypkg:apk/chainguard/openjdk-11-openj9-docpkg:apk/chainguard/openjdk-11-openj9-jmodspkg:apk/chainguard/openjdk-11-openj9-jrepkg:apk/chainguard/openjdk-17-openj9pkg:apk/chainguard/openjdk-17-openj9-dbgpkg:apk/chainguard/openjdk-17-openj9-default-jdkpkg:apk/chainguard/openjdk-17-openj9-default-jvmpkg:apk/chainguard/openjdk-17-openj9-default-policypkg:apk/chainguard/openjdk-17-openj9-docpkg:apk/chainguard/openjdk-17-openj9-jmodspkg:apk/chainguard/openjdk-17-openj9-jrepkg:apk/chainguard/openjdk-21-openj9pkg:apk/chainguard/openjdk-21-openj9-dbgpkg:apk/chainguard/openjdk-21-openj9-default-jdkpkg:apk/chainguard/openjdk-21-openj9-default-jvmpkg:apk/chainguard/openjdk-21-openj9-default-policypkg:apk/chainguard/openjdk-21-openj9-docpkg:apk/chainguard/openjdk-21-openj9-jmodspkg:apk/chainguard/openjdk-21-openj9-jrepkg:apk/chainguard/openjdk-8-openj9pkg:apk/chainguard/openjdk-8-openj9-dbgpkg:apk/chainguard/openjdk-8-openj9-default-jdkpkg:apk/chainguard/openjdk-8-openj9-default-jvmpkg:apk/chainguard/openjdk-8-openj9-docpkg:apk/chainguard/openjdk-8-openj9-jrepkg:rpm/opensuse/java-1_8_0-openjdk&distro=openSUSE%20Tumbleweedpkg:rpm/suse/java-1_6_0-ibm&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2012pkg:rpm/suse/java-1_6_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/java-1_6_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/java-1_6_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/java-1_6_0-ibm&distro=SUSE%20Manager%202.1pkg:rpm/suse/java-1_6_0-ibm&distro=SUSE%20Manager%20Proxy%202.1pkg:rpm/suse/java-1_6_0-ibm&distro=SUSE%20OpenStack%20Cloud%205pkg:rpm/suse/java-1_7_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/java-1_7_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/java-1_7_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/java-1_7_0-ibm&distro=SUSE%20Manager%202.1pkg:rpm/suse/java-1_7_0-ibm&distro=SUSE%20Manager%20Proxy%202.1pkg:rpm/suse/java-1_7_0-ibm&distro=SUSE%20OpenStack%20Cloud%205pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/java-1_7_1-ibm&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1
< 0.53.0-r0+ 58 more
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r0
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 0.53.0-r1
- (no CPE)range: < 1.8.0.111-1.1
- (no CPE)range: < 1.6.0_sr16.25-34.1
- (no CPE)range: < 1.6.0_sr16.25-69.1
- (no CPE)range: < 1.6.0_sr16.25-69.1
- (no CPE)range: < 1.6.0_sr16.25-69.1
- (no CPE)range: < 1.6.0_sr16.25-69.1
- (no CPE)range: < 1.6.0_sr16.25-69.1
- (no CPE)range: < 1.6.0_sr16.25-69.1
- (no CPE)range: < 1.7.0_sr9.40-52.1
- (no CPE)range: < 1.7.0_sr9.40-52.1
- (no CPE)range: < 1.7.0_sr9.40-52.1
- (no CPE)range: < 1.7.0_sr9.40-52.1
- (no CPE)range: < 1.7.0_sr9.40-52.1
- (no CPE)range: < 1.7.0_sr9.40-52.1
- (no CPE)range: < 1.7.1_sr3.40-13.1
- (no CPE)range: < 1.7.1_sr3.40-25.1
- (no CPE)range: < 1.7.1_sr3.40-25.1
- (no CPE)range: < 1.7.1_sr3.40-13.1
- (no CPE)range: < 1.7.1_sr3.40-25.1
- (no CPE)range: < 1.7.1_sr3.40-25.1
- (no CPE)range: < 1.7.1_sr3.40-13.1
- (no CPE)range: < 1.7.1_sr3.40-25.1
- (no CPE)range: < 1.7.1_sr3.40-25.1
- (no CPE)range: < 1.8.0_sr3.0-10.1
- (no CPE)range: < 1.8.0_sr3.0-10.1
- (no CPE)range: < 1.8.0_sr3.0-10.1
- (no CPE)range: < 1.8.0.91-11.1
- (no CPE)range: < 1.8.0.91-11.1
- (no CPE)range: < 1.8.0.91-11.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
29- www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlnvdVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0650.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0651.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0677.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0701.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0702.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0708.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0716.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-1039.htmlnvd
- www.debian.org/security/2016/dsa-3558nvd
- www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlnvd
- www.securityfocus.com/bid/86449nvd
- www.securitytracker.com/id/1035596nvd
- www.ubuntu.com/usn/USN-2963-1nvd
- access.redhat.com/errata/RHSA-2016:1430nvd
- access.redhat.com/errata/RHSA-2017:1216nvd
- security.gentoo.org/glsa/201610-08nvd
- security.netapp.com/advisory/ntap-20160420-0001/nvd
News mentions
0No linked articles in our index yet.