TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2010-0840

CRITICALCISA KEV
9.8

Beschreibung

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht4/1/2010
Zuletzt geandert4/21/2026
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerOracle
ProduktJava Runtime Environment (JRE)
SchwachstellennameOracle JRE Unspecified Vulnerability
KEV Aufnahmedatum2022-05-25
Behebungsfrist2022-06-15
Ransomware-NutzungUnknown

Betroffene Produkte

canonical:ubuntu_linuxopensuse:opensuseoracle:jre

Referenzen

http://secunia.com/advisories/39292(secalert_us@oracle.com)
http://secunia.com/advisories/39317(secalert_us@oracle.com)
http://secunia.com/advisories/39659(secalert_us@oracle.com)
http://secunia.com/advisories/39819(secalert_us@oracle.com)
http://secunia.com/advisories/40211(secalert_us@oracle.com)
http://secunia.com/advisories/40545(secalert_us@oracle.com)
http://secunia.com/advisories/43308(secalert_us@oracle.com)
http://support.apple.com/kb/HT4170(secalert_us@oracle.com)
http://support.apple.com/kb/HT4171(secalert_us@oracle.com)
http://ubuntu.com/usn/usn-923-1(secalert_us@oracle.com)
http://marc.info/?l=bugtraq&m=127557596201693&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=134254866602253&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/39292(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/39317(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/39659(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/39819(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/40211(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/40545(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43308(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT4170(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT4171(af854a3a-2127-422b-91ae-364da2661108)
http://ubuntu.com/usn/usn-923-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0337.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0338.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0339.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0383.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0471.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0489.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/39065(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1107(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1191(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1454(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1523(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1793(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-10-056(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.