Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
06 Jan 2025, 19:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1523 - Broken Link, Vendor Advisory | |
References | () http://lists.apple.com/archives/security-announce/2010//May/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - Patch, Third Party Advisory | |
References | () http://secunia.com/advisories/39317 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/43308 - Broken Link, Vendor Advisory | |
References | () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - Release Notes | |
References | () http://lists.apple.com/archives/security-announce/2010//May/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0338.html - Broken Link | |
References | () http://www.securityfocus.com/archive/1/516397/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2010/1191 - Broken Link, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=127557596201693&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=134254866602253&w=2 - Mailing List | |
References | () http://www.securityfocus.com/bid/39065 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0489.html - Broken Link | |
References | () http://secunia.com/advisories/39659 - Broken Link, Vendor Advisory | |
References | () http://support.apple.com/kb/HT4170 - Release Notes, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0471.html - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 - Broken Link | |
References | () http://www.securityfocus.com/archive/1/510528/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/40545 - Broken Link, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0337.html - Broken Link | |
References | () http://secunia.com/advisories/40211 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1454 - Broken Link, Vendor Advisory | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0383.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0339.html - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1793 - Broken Link, Vendor Advisory | |
References | () http://ubuntu.com/usn/usn-923-1 - Third Party Advisory | |
References | () http://secunia.com/advisories/39819 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/39292 - Broken Link, Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html - Patch, Third Party Advisory | |
References | () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - Broken Link | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-056 - Third Party Advisory, VDB Entry | |
References | () http://support.apple.com/kb/HT4171 - Release Notes, Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1107 - Broken Link |
28 Jun 2024, 17:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:* cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:* cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:* cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:* cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:* |
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.4.2_25:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:* |
First Time |
Opensuse opensuse
Oracle jre Opensuse Canonical Oracle Canonical ubuntu Linux |
|
References | (CONFIRM) http://www.vmware.com/security/advisories/VMSA-2011-0003.html - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - Mailing List, Third Party Advisory | |
References | (MISC) http://www.zerodayinitiative.com/advisories/ZDI-10-056 - Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://support.apple.com/kb/HT4170 - Release Notes, Third Party Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/39819 - Broken Link, Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1191 - Broken Link, Vendor Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0339.html - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/40211 - Broken Link, Vendor Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=134254866602253&w=2 - Mailing List | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1523 - Broken Link, Vendor Advisory | |
References | (UBUNTU) http://ubuntu.com/usn/usn-923-1 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/43308 - Broken Link, Vendor Advisory | |
References | (CONFIRM) http://support.apple.com/kb/HT4171 - Release Notes, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/40545 - Broken Link, Vendor Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0471.html - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0338.html - Broken Link | |
References | (HP) http://marc.info/?l=bugtraq&m=127557596201693&w=2 - Mailing List | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0383.html - Broken Link | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1454 - Broken Link, Vendor Advisory | |
References | (CONFIRM) http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - Release Notes | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971 - Broken Link | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1793 - Broken Link, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/39292 - Broken Link, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/39317 - Broken Link, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/39065 - Broken Link, Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1107 - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html - Patch, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/39659 - Broken Link, Vendor Advisory | |
References | (APPLE) http://lists.apple.com/archives/security-announce/2010//May/msg00001.html - Mailing List, Third Party Advisory | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/510528/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html - Mailing List, Third Party Advisory | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/516397/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0489.html - Broken Link | |
References | (HP) http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0337.html - Broken Link | |
References | (APPLE) http://lists.apple.com/archives/security-announce/2010//May/msg00002.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
Information
Published : 2010-04-01 16:30
Updated : 2025-03-13 20:45
NVD link : CVE-2010-0840
Mitre link : CVE-2010-0840
JSON object : View
Products Affected
canonical
- ubuntu_linux
oracle
- jre
opensuse
- opensuse
CWE