CVE-2010-0838

Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow using an untrusted size value in the readMabCurveData function in the CMM module in the JVM.
References
Link Resource
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
http://marc.info/?l=bugtraq&m=127557596201693&w=2
http://marc.info/?l=bugtraq&m=127557596201693&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://secunia.com/advisories/39292 Vendor Advisory
http://secunia.com/advisories/39317 Vendor Advisory
http://secunia.com/advisories/39659 Vendor Advisory
http://secunia.com/advisories/39819 Vendor Advisory
http://secunia.com/advisories/40545 Vendor Advisory
http://secunia.com/advisories/43308 Vendor Advisory
http://support.apple.com/kb/HT4170
http://support.apple.com/kb/HT4171
http://ubuntu.com/usn/usn-923-1
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
http://www.redhat.com/support/errata/RHSA-2010-0337.html
http://www.redhat.com/support/errata/RHSA-2010-0338.html
http://www.redhat.com/support/errata/RHSA-2010-0339.html
http://www.redhat.com/support/errata/RHSA-2010-0383.html
http://www.redhat.com/support/errata/RHSA-2010-0471.html
http://www.securityfocus.com/archive/1/510534/100/0/threaded
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.securityfocus.com/bid/39069
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://www.vupen.com/english/advisories/2010/1107 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1191 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1454 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-10-061
https://exchange.xforce.ibmcloud.com/vulnerabilities/57346
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10482
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13923
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
http://marc.info/?l=bugtraq&m=127557596201693&w=2
http://marc.info/?l=bugtraq&m=127557596201693&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://secunia.com/advisories/39292 Vendor Advisory
http://secunia.com/advisories/39317 Vendor Advisory
http://secunia.com/advisories/39659 Vendor Advisory
http://secunia.com/advisories/39819 Vendor Advisory
http://secunia.com/advisories/40545 Vendor Advisory
http://secunia.com/advisories/43308 Vendor Advisory
http://support.apple.com/kb/HT4170
http://support.apple.com/kb/HT4171
http://ubuntu.com/usn/usn-923-1
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
http://www.redhat.com/support/errata/RHSA-2010-0337.html
http://www.redhat.com/support/errata/RHSA-2010-0338.html
http://www.redhat.com/support/errata/RHSA-2010-0339.html
http://www.redhat.com/support/errata/RHSA-2010-0383.html
http://www.redhat.com/support/errata/RHSA-2010-0471.html
http://www.securityfocus.com/archive/1/510534/100/0/threaded
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.securityfocus.com/bid/39069
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://www.vupen.com/english/advisories/2010/1107 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1191 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1454 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-10-061
https://exchange.xforce.ibmcloud.com/vulnerabilities/57346
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10482
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13923
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*

History

21 Nov 2024, 01:13

Type Values Removed Values Added
References () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 -
References () http://lists.apple.com/archives/security-announce/2010//May/msg00001.html - () http://lists.apple.com/archives/security-announce/2010//May/msg00001.html -
References () http://lists.apple.com/archives/security-announce/2010//May/msg00002.html - () http://lists.apple.com/archives/security-announce/2010//May/msg00002.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html -
References () http://marc.info/?l=bugtraq&m=127557596201693&w=2 - () http://marc.info/?l=bugtraq&m=127557596201693&w=2 -
References () http://marc.info/?l=bugtraq&m=134254866602253&w=2 - () http://marc.info/?l=bugtraq&m=134254866602253&w=2 -
References () http://secunia.com/advisories/39292 - Vendor Advisory () http://secunia.com/advisories/39292 - Vendor Advisory
References () http://secunia.com/advisories/39317 - Vendor Advisory () http://secunia.com/advisories/39317 - Vendor Advisory
References () http://secunia.com/advisories/39659 - Vendor Advisory () http://secunia.com/advisories/39659 - Vendor Advisory
References () http://secunia.com/advisories/39819 - Vendor Advisory () http://secunia.com/advisories/39819 - Vendor Advisory
References () http://secunia.com/advisories/40545 - Vendor Advisory () http://secunia.com/advisories/40545 - Vendor Advisory
References () http://secunia.com/advisories/43308 - Vendor Advisory () http://secunia.com/advisories/43308 - Vendor Advisory
References () http://support.apple.com/kb/HT4170 - () http://support.apple.com/kb/HT4170 -
References () http://support.apple.com/kb/HT4171 - () http://support.apple.com/kb/HT4171 -
References () http://ubuntu.com/usn/usn-923-1 - () http://ubuntu.com/usn/usn-923-1 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 -
References () http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - () http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -
References () http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html - () http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0337.html - () http://www.redhat.com/support/errata/RHSA-2010-0337.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0338.html - () http://www.redhat.com/support/errata/RHSA-2010-0338.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0339.html - () http://www.redhat.com/support/errata/RHSA-2010-0339.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0383.html - () http://www.redhat.com/support/errata/RHSA-2010-0383.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0471.html - () http://www.redhat.com/support/errata/RHSA-2010-0471.html -
References () http://www.securityfocus.com/archive/1/510534/100/0/threaded - () http://www.securityfocus.com/archive/1/510534/100/0/threaded -
References () http://www.securityfocus.com/archive/1/516397/100/0/threaded - () http://www.securityfocus.com/archive/1/516397/100/0/threaded -
References () http://www.securityfocus.com/bid/39069 - () http://www.securityfocus.com/bid/39069 -
References () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - () http://www.vmware.com/security/advisories/VMSA-2011-0003.html -
References () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -
References () http://www.vupen.com/english/advisories/2010/1107 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1107 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1191 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1191 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1454 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1454 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1793 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1793 - Vendor Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-10-061 - () http://www.zerodayinitiative.com/advisories/ZDI-10-061 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/57346 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/57346 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10482 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10482 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13923 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13923 -

Information

Published : 2010-04-01 16:30

Updated : 2024-11-21 01:13


NVD link : CVE-2010-0838

Mitre link : CVE-2010-0838

CVE.ORG link : CVE-2010-0838


JSON object : View

Products Affected

sun

  • jre
  • jdk