CVE-2010-4351

The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader.
References
Link Resource
http://blog.fuseyism.com/index.php/2011/01/18/security-icedtea6-177-184-194-released/
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053276.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053288.html
http://osvdb.org/70605
http://secunia.com/advisories/43002 Vendor Advisory
http://secunia.com/advisories/43078
http://secunia.com/advisories/43085
http://secunia.com/advisories/43135
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://www.debian.org/security/2011/dsa-2224
http://www.mandriva.com/security/advisories?name=MDVSA-2011:054
http://www.redhat.com/support/errata/RHSA-2011-0176.html
http://www.securityfocus.com/bid/45894
http://www.ubuntu.com/usn/USN-1052-1
http://www.ubuntu.com/usn/USN-1055-1
http://www.vupen.com/english/advisories/2011/0165 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0166 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0215
http://www.vupen.com/english/advisories/2011/0239
http://www.zerodayinitiative.com/advisories/ZDI-11-014/
https://bugzilla.redhat.com/show_bug.cgi?id=663680 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/64893
http://blog.fuseyism.com/index.php/2011/01/18/security-icedtea6-177-184-194-released/
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053276.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053288.html
http://osvdb.org/70605
http://secunia.com/advisories/43002 Vendor Advisory
http://secunia.com/advisories/43078
http://secunia.com/advisories/43085
http://secunia.com/advisories/43135
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://www.debian.org/security/2011/dsa-2224
http://www.mandriva.com/security/advisories?name=MDVSA-2011:054
http://www.redhat.com/support/errata/RHSA-2011-0176.html
http://www.securityfocus.com/bid/45894
http://www.ubuntu.com/usn/USN-1052-1
http://www.ubuntu.com/usn/USN-1055-1
http://www.vupen.com/english/advisories/2011/0165 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0166 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0215
http://www.vupen.com/english/advisories/2011/0239
http://www.zerodayinitiative.com/advisories/ZDI-11-014/
https://bugzilla.redhat.com/show_bug.cgi?id=663680 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/64893
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:redhat:icedtea:1.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://blog.fuseyism.com/index.php/2011/01/18/security-icedtea6-177-184-194-released/ - () http://blog.fuseyism.com/index.php/2011/01/18/security-icedtea6-177-184-194-released/ -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053276.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053276.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053288.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053288.html -
References () http://osvdb.org/70605 - () http://osvdb.org/70605 -
References () http://secunia.com/advisories/43002 - Vendor Advisory () http://secunia.com/advisories/43002 - Vendor Advisory
References () http://secunia.com/advisories/43078 - () http://secunia.com/advisories/43078 -
References () http://secunia.com/advisories/43085 - () http://secunia.com/advisories/43085 -
References () http://secunia.com/advisories/43135 - () http://secunia.com/advisories/43135 -
References () http://security.gentoo.org/glsa/glsa-201406-32.xml - () http://security.gentoo.org/glsa/glsa-201406-32.xml -
References () http://www.debian.org/security/2011/dsa-2224 - () http://www.debian.org/security/2011/dsa-2224 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:054 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:054 -
References () http://www.redhat.com/support/errata/RHSA-2011-0176.html - () http://www.redhat.com/support/errata/RHSA-2011-0176.html -
References () http://www.securityfocus.com/bid/45894 - () http://www.securityfocus.com/bid/45894 -
References () http://www.ubuntu.com/usn/USN-1052-1 - () http://www.ubuntu.com/usn/USN-1052-1 -
References () http://www.ubuntu.com/usn/USN-1055-1 - () http://www.ubuntu.com/usn/USN-1055-1 -
References () http://www.vupen.com/english/advisories/2011/0165 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0165 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0166 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0166 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0215 - () http://www.vupen.com/english/advisories/2011/0215 -
References () http://www.vupen.com/english/advisories/2011/0239 - () http://www.vupen.com/english/advisories/2011/0239 -
References () http://www.zerodayinitiative.com/advisories/ZDI-11-014/ - () http://www.zerodayinitiative.com/advisories/ZDI-11-014/ -
References () https://bugzilla.redhat.com/show_bug.cgi?id=663680 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=663680 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/64893 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/64893 -

Information

Published : 2011-01-20 19:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4351

Mitre link : CVE-2010-4351

CVE.ORG link : CVE-2010-4351


JSON object : View

Products Affected

redhat

  • icedtea

sun

  • openjdk
CWE
CWE-264

Permissions, Privileges, and Access Controls