CVE-2012-0507

Summary

CVECVE-2012-0507
StatePUBLISHED
Assigneroracle
Source PriorityCVE Program / NVD first with legacy fallback
Published2012-06-07 22:55:17 UTC
Updated2026-04-22 13:21:21 UTC
DescriptionUnspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.

Risk And Classification

Primary CVSS: v3.1 9.8 CRITICAL from ADP

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS: 0.935680000 probability, percentile 0.998340000 (date 2026-04-22)

CISA KEV: Listed on 2022-03-03; due 2022-03-24; ransomware use Known

Problem Types: NVD-CWE-noinfo | CWE-843 | n/a | CWE-843 CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')


VersionSourceTypeScoreSeverityVector
3.1ADPDECLARED9.8CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.1134c704f-9b21-4f2e-91b3-4a467353bcc0Secondary9.8CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.0[email protected]Primary10AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0 Breakdown

Access Vector
Network
Access Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete

AV:N/AC:L/Au:N/C:C/I:C/A:C

CISA Known Exploited Vulnerability

VendorOracle
ProductJava SE
NameOracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability
Required ActionApply updates per vendor instructions.
Noteshttps://nvd.nist.gov/vuln/detail/CVE-2012-0507

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 6.0 All All All
Operating System Debian Debian Linux 7.0 All All All
Application Oracle Jre 1.6.0 update22 All All
Application Oracle Jre 1.6.0 update23 All All
Application Oracle Jre 1.6.0 update24 All All
Application Oracle Jre 1.6.0 update25 All All
Application Oracle Jre 1.6.0 update26 All All
Application Oracle Jre 1.6.0 update27 All All
Application Oracle Jre 1.6.0 update29 All All
Application Oracle Jre 1.6.0 update30 All All
Application Oracle Jre 1.7.0 - All All
Application Oracle Jre 1.7.0 update1 All All
Application Oracle Jre 1.7.0 update2 All All
Application Sun Jre 1.5.0 - All All
Application Sun Jre 1.5.0 update1 All All
Application Sun Jre 1.5.0 update10 All All
Application Sun Jre 1.5.0 update11 All All
Application Sun Jre 1.5.0 update12 All All
Application Sun Jre 1.5.0 update13 All All
Application Sun Jre 1.5.0 update14 All All
Application Sun Jre 1.5.0 update15 All All
Application Sun Jre 1.5.0 update16 All All
Application Sun Jre 1.5.0 update17 All All
Application Sun Jre 1.5.0 update18 All All
Application Sun Jre 1.5.0 update19 All All
Application Sun Jre 1.5.0 update2 All All
Application Sun Jre 1.5.0 update20 All All
Application Sun Jre 1.5.0 update21 All All
Application Sun Jre 1.5.0 update22 All All
Application Sun Jre 1.5.0 update23 All All
Application Sun Jre 1.5.0 update24 All All
Application Sun Jre 1.5.0 update25 All All
Application Sun Jre 1.5.0 update26 All All
Application Sun Jre 1.5.0 update27 All All
Application Sun Jre 1.5.0 update28 All All
Application Sun Jre 1.5.0 update29 All All
Application Sun Jre 1.5.0 update3 All All
Application Sun Jre 1.5.0 update31 All All
Application Sun Jre 1.5.0 update33 All All
Application Sun Jre 1.5.0 update4 All All
Application Sun Jre 1.5.0 update5 All All
Application Sun Jre 1.5.0 update6 All All
Application Sun Jre 1.5.0 update7 All All
Application Sun Jre 1.5.0 update8 All All
Application Sun Jre 1.5.0 update9 All All
Application Sun Jre 1.6.0 - All All
Application Sun Jre 1.6.0 update_1 All All
Application Sun Jre 1.6.0 update_10 All All
Application Sun Jre 1.6.0 update_11 All All
Application Sun Jre 1.6.0 update_12 All All
Application Sun Jre 1.6.0 update_13 All All
Application Sun Jre 1.6.0 update_14 All All
Application Sun Jre 1.6.0 update_15 All All
Application Sun Jre 1.6.0 update_16 All All
Application Sun Jre 1.6.0 update_17 All All
Application Sun Jre 1.6.0 update_18 All All
Application Sun Jre 1.6.0 update_19 All All
Application Sun Jre 1.6.0 update_2 All All
Application Sun Jre 1.6.0 update_20 All All
Application Sun Jre 1.6.0 update_21 All All
Application Sun Jre 1.6.0 update_3 All All
Application Sun Jre 1.6.0 update_4 All All
Application Sun Jre 1.6.0 update_5 All All
Application Sun Jre 1.6.0 update_6 All All
Application Sun Jre 1.6.0 update_7 All All
Operating System Suse Linux Enterprise Desktop 10 sp4 All All
Operating System Suse Linux Enterprise Java 10 sp4 All All
Operating System Suse Linux Enterprise Java 11 sp1 All All
Operating System Suse Linux Enterprise Server 10 sp4 All All
Operating System Suse Linux Enterprise Server 11 sp1 All All
Operating System Suse Linux Enterprise Server 11 sp1 All All
Operating System Suse Linux Enterprise Server 11 sp2 All All
Operating System Suse Linux Enterprise Software Development Kit 11 sp1 All All
Operating System Suse Linux Enterprise Software Development Kit 11 sp2 All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Na N/a affected n/a Not specified

References

ReferenceSourceLinkTags
'[security bulletin] HPSBUX02760 SSRT100805 rev.1 - HP-UX Running Java, Remote Unauthorized Access, D' - MARC af854a3a-2127-422b-91ae-364da2661108 marc.info Third Party Advisory
[security-announce] SUSE-SU-2012:0602-1: important: Security update for af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Issue Tracking, Third Party Advisory
'[security bulletin] HPSBUX02784 SSRT100871 rev.1 - HP-UX Running Java, Remote Unauthorized Access, D' - MARC af854a3a-2127-422b-91ae-364da2661108 marc.info Third Party Advisory
Oracle Java Critical Patch Update - February 2012 af854a3a-2127-422b-91ae-364da2661108 www.oracle.com Vendor Advisory
404 - Content Not Found | Microsoft Docs af854a3a-2127-422b-91ae-364da2661108 blogs.technet.com Broken Link, Third Party Advisory
IKVM.NET Weblog - February 2012 Java Critical Patch Update Vulnerability Details af854a3a-2127-422b-91ae-364da2661108 weblog.ikvm.net Broken Link, Exploit
New Java Attack Rolled into Exploit Packs — Krebs on Security af854a3a-2127-422b-91ae-364da2661108 krebsonsecurity.com Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 rhn.redhat.com Third Party Advisory
'[security bulletin] HPSBUX02757 SSRT100779 rev.2 - HP-UX Running Java, Remote Unauthorized Access, D' - MARC af854a3a-2127-422b-91ae-364da2661108 marc.info Third Party Advisory
About Secunia Research | Flexera af854a3a-2127-422b-91ae-364da2661108 secunia.com Broken Link, Not Applicable
'[security bulletin] HPSBMU02799 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.0x Running JD' - MARC af854a3a-2127-422b-91ae-364da2661108 marc.info Third Party Advisory
Security Advisory SA48950 - Red Hat update for java-1.6.0-ibm - Secunia af854a3a-2127-422b-91ae-364da2661108 secunia.com Broken Link, Not Applicable
Bug 788994 – CVE-2012-0507 OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299) af854a3a-2127-422b-91ae-364da2661108 bugzilla.redhat.com Issue Tracking
[security-announce] SUSE-SU-2012:0603-1: important: Security update for af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Mailing List, Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 rhn.redhat.com Third Party Advisory
Oracle Java SE Remote Java Runtime Environment Code Execution Vulnerability af854a3a-2127-422b-91ae-364da2661108 www.securityfocus.com Broken Link, Exploit, Third Party Advisory, VDB Entry
www.cisa.gov/known-exploited-vulnerabilities-catalog 134c704f-9b21-4f2e-91b3-4a467353bcc0 www.cisa.gov US Government Resource
About Secunia Research | Flexera af854a3a-2127-422b-91ae-364da2661108 secunia.com Broken Link, Not Applicable
About Secunia Research | Flexera af854a3a-2127-422b-91ae-364da2661108 secunia.com Broken Link, Not Applicable
'[security bulletin] HPSBMU02797 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.1x Running JD' - MARC af854a3a-2127-422b-91ae-364da2661108 marc.info Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 rhn.redhat.com Third Party Advisory
About Secunia Research | Flexera af854a3a-2127-422b-91ae-364da2661108 secunia.com Broken Link, Not Applicable
Debian -- Security Information -- DSA-2420-1 openjdk-6 af854a3a-2127-422b-91ae-364da2661108 www.debian.org Mailing List, Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
CISA Known Exploited Vulnerabilities catalog CISA www.cisa.gov kev

Additional Advisory Data

SourceTimeEvent
ADP2022-03-03T00:00:00.000ZCVE-2012-0507 added to CISA KEV
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report