SDK/RTE 1.4.2.28 Release Notes

Table Of Contents
Table 1 Security Fixes (continued)
NoteComponentCVE
See Note 8JSSECVE-2011-3389
See Note 1NetworkingCVE-2011-3552
See Note 22DCVE-2012-0499
See Note 1I18nCVE-2012-0503
See Note 1SerializationCVE-2012-0505
See Note 1AWTCVE-2012-0502
See Note 2SoundCVE-2011-3563
See Note 1CORBACVE-2012-0506
Note 1. Applies to client deployment of Java only. This vulnerability can be exploited
only through Untrusted Java Web Start applications and Untrusted Java applets.
(Untrusted Java Web Start applications and untrusted applets run in the Java sandbox
with limited privileges.)
Note 2. Applies to client and server deployment of Java. This vulnerability can be
exploited through Untrusted Java Web Start applications and Untrusted Java applets.
It can also be exploited by supplying data to APIs in the specified Component without
using untrusted Java Web Start applications or untrusted Java applets, such as through
a web service.
Note 3. Fix addresses multiple instances of this vulnerability. Applies to client and
server deployments of Java. This vulnerability can be exploited through Untrusted
Java Web Start applications and Untrusted Java applets. It can also be exploited by
supplying data to APIs in the specified Component without using untrusted Java Web
Start applications or untrusted Java applets, such as through a web service.
Note 4. Applies to client deployment of Java only. This vulnerability is applicable only
to systems using the Java Update (which is available only on the Windows platform).
Note 5. Applies to server deployment of Java. This vulnerability can only be exploited
by supplying data to APIs in the specified Component without using Untrusted Java
Web Start applications or Untrusted Java applets, such as through a web service.
Note 6. Applies to client deployment of Java only. This vulnerability can be exploited
only when a user runs a standalone application.
Note 7. Applies to RMI server deployments of Java.
Note 8. This is a vulnerability in the SSLv3/TLS 1.0 protocol. Exploitation of this
vulnerability requires a man-in-the-middle and the attacker needs to be able to inject
chosen plaintext.
Security fixes in the 1.4.2.28 release 27