|Description||Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applets to read arbitrary files and make unauthorized network connections via unknown vectors related to applet classloading, aka 6716217.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||high (attack range: remote)|
|Debian Bugs||508194, 508195|
Vulnerable and fixed packages
The table below lists information on source packages.
|openjdk-6 (PTS)||wheezy, wheezy (security)||6b38-1.13.10-1~deb7u1||fixed|
The information below is based on the following data on fixed versions.
[etch] - sun-java5 <no-dsa> (Non-free not supported)
- openjdk-6 <not-affected> (browser plugin is different code base)