Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this involves the use of the privileged accept method in the ServerSocket class, which does not limit which hosts can connect and allows remote attackers to bypass intended network access restrictions.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748 - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html - | |
References | () http://marc.info/?l=bugtraq&m=134254866602253&w=2 - | |
References | () http://secunia.com/advisories/41972 - Vendor Advisory | |
References | () http://secunia.com/advisories/42377 - Vendor Advisory | |
References | () http://secunia.com/advisories/42974 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-201406-32.xml - | |
References | () http://support.avaya.com/css/P8/documents/100114315 - | |
References | () http://support.avaya.com/css/P8/documents/100114327 - | |
References | () http://support.avaya.com/css/P8/documents/100123193 - | |
References | () http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html - | |
References | () http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html - | |
References | () http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0768.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0770.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0865.html - | |
References | () http://www.securityfocus.com/archive/1/516397/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/44013 - | |
References | () http://www.ubuntu.com/usn/USN-1010-1 - | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - | |
References | () http://www.vupen.com/english/advisories/2010/3086 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=639880 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12200 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12437 - |
Information
Published : 2010-10-19 22:00
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3561
Mitre link : CVE-2010-3561
CVE.ORG link : CVE-2010-3561
JSON object : View
Products Affected
sun
- jre
- jdk
CWE