Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2010//May/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://lists.apple.com/archives/security-announce/2010//May/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=127557596201693&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=134254866602253&w=2 - Mailing List | |
References | () http://secunia.com/advisories/39292 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/39317 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/39659 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/39819 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/40211 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/40545 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/43308 - Broken Link, Vendor Advisory | |
References | () http://support.apple.com/kb/HT4170 - Release Notes, Third Party Advisory | |
References | () http://support.apple.com/kb/HT4171 - Release Notes, Third Party Advisory | |
References | () http://ubuntu.com/usn/usn-923-1 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 - Broken Link | |
References | () http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - Patch, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html - Patch, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0337.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0338.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0339.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0383.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0471.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0489.html - Broken Link | |
References | () http://www.securityfocus.com/archive/1/510528/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/archive/1/516397/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/39065 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - Third Party Advisory | |
References | () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - Release Notes | |
References | () http://www.vupen.com/english/advisories/2010/1107 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1191 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1454 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1523 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1793 - Broken Link, Vendor Advisory | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-056 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 - Broken Link |
28 Jun 2024, 17:36
Type | Values Removed | Values Added |
---|---|---|
First Time |
Oracle
Opensuse opensuse Canonical ubuntu Linux Oracle jre Canonical Opensuse |
|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
References | () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2010//May/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://lists.apple.com/archives/security-announce/2010//May/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=127557596201693&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=134254866602253&w=2 - Mailing List | |
References | () http://secunia.com/advisories/39292 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/39317 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/39659 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/39819 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/40211 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/40545 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/43308 - Broken Link, Vendor Advisory | |
References | () http://support.apple.com/kb/HT4170 - Release Notes, Third Party Advisory | |
References | () http://support.apple.com/kb/HT4171 - Release Notes, Third Party Advisory | |
References | () http://ubuntu.com/usn/usn-923-1 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 - Broken Link | |
References | () http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - Patch, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html - Patch, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0337.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0338.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0339.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0383.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0471.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0489.html - Broken Link | |
References | () http://www.securityfocus.com/archive/1/510528/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/archive/1/516397/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/39065 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - Third Party Advisory | |
References | () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - Release Notes | |
References | () http://www.vupen.com/english/advisories/2010/1107 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1191 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1454 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1523 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1793 - Broken Link, Vendor Advisory | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-056 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 - Broken Link | |
CPE | cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:* cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:* cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:* cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:* cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:* |
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.4.2_25:*:*:*:*:*:*:* |
Information
Published : 2010-04-01 16:30
Updated : 2024-11-21 01:13
NVD link : CVE-2010-0840
Mitre link : CVE-2010-0840
CVE.ORG link : CVE-2010-0840
JSON object : View
Products Affected
opensuse
- opensuse
canonical
- ubuntu_linux
oracle
- jre
CWE