CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.3%
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) “a similar trust issue with interfaces,” aka “Trusted Methods Chaining Remote Code Execution Vulnerability.”
itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
lists.apple.com/archives/security-announce/2010//May/msg00001.html
lists.apple.com/archives/security-announce/2010//May/msg00002.html
lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
marc.info/?l=bugtraq&m=127557596201693&w=2
marc.info/?l=bugtraq&m=134254866602253&w=2
secunia.com/advisories/39292
secunia.com/advisories/39317
secunia.com/advisories/39659
secunia.com/advisories/39819
secunia.com/advisories/40211
secunia.com/advisories/40545
secunia.com/advisories/43308
support.apple.com/kb/HT4170
support.apple.com/kb/HT4171
ubuntu.com/usn/usn-923-1
www.mandriva.com/security/advisories?name=MDVSA-2010:084
www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
www.redhat.com/support/errata/RHSA-2010-0337.html
www.redhat.com/support/errata/RHSA-2010-0338.html
www.redhat.com/support/errata/RHSA-2010-0339.html
www.redhat.com/support/errata/RHSA-2010-0383.html
www.redhat.com/support/errata/RHSA-2010-0471.html
www.redhat.com/support/errata/RHSA-2010-0489.html
www.securityfocus.com/archive/1/510528/100/0/threaded
www.securityfocus.com/archive/1/516397/100/0/threaded
www.securityfocus.com/bid/39065
www.vmware.com/security/advisories/VMSA-2011-0003.html
www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
www.vupen.com/english/advisories/2010/1107
www.vupen.com/english/advisories/2010/1191
www.vupen.com/english/advisories/2010/1454
www.vupen.com/english/advisories/2010/1523
www.vupen.com/english/advisories/2010/1793
www.zerodayinitiative.com/advisories/ZDI-10-056
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.3%