Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html - | |
References | () http://marc.info/?l=bugtraq&m=134254866602253&w=2 - | |
References | () http://secunia.com/advisories/41967 - Vendor Advisory | |
References | () http://secunia.com/advisories/41972 - Vendor Advisory | |
References | () http://secunia.com/advisories/42377 - Vendor Advisory | |
References | () http://secunia.com/advisories/42974 - Vendor Advisory | |
References | () http://secunia.com/advisories/44954 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-201406-32.xml - | |
References | () http://support.avaya.com/css/P8/documents/100114315 - | |
References | () http://support.avaya.com/css/P8/documents/100123193 - | |
References | () http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html - | |
References | () http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html - Patch, Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0770.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0807.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0873.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0987.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0880.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/516397/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/43988 - | |
References | () http://www.ubuntu.com/usn/USN-1010-1 - | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - | |
References | () http://www.vupen.com/english/advisories/2010/3086 - Vendor Advisory | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-204/ - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11560 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12225 - |
Information
Published : 2010-10-19 22:00
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3566
Mitre link : CVE-2010-3566
CVE.ORG link : CVE-2010-3566
JSON object : View
Products Affected
sun
- jre
- jdk
CWE