7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.944 High
EPSS
Percentile
98.9%
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) βa similar trust issue with interfaces,β aka βTrusted Methods Chaining Remote Code Execution Vulnerability.β
Recent assessments:
Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0
itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
lists.apple.com/archives/security-announce/2010//May/msg00001.html
lists.apple.com/archives/security-announce/2010//May/msg00002.html
lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
marc.info?l=bugtraq&m=127557596201693&w=2
marc.info?l=bugtraq&m=134254866602253&w=2
secunia.com/advisories/39292
secunia.com/advisories/39317
secunia.com/advisories/39659
secunia.com/advisories/39819
secunia.com/advisories/40211
secunia.com/advisories/40545
secunia.com/advisories/43308
support.apple.com/kb/HT4170
support.apple.com/kb/HT4171
ubuntu.com/usn/usn-923-1
www.mandriva.com/security/advisories?name=MDVSA-2010:084
www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
www.redhat.com/support/errata/RHSA-2010-0337.html
www.redhat.com/support/errata/RHSA-2010-0338.html
www.redhat.com/support/errata/RHSA-2010-0339.html
www.redhat.com/support/errata/RHSA-2010-0383.html
www.redhat.com/support/errata/RHSA-2010-0471.html
www.redhat.com/support/errata/RHSA-2010-0489.html
www.securityfocus.com/archive/1/510528/100/0/threaded
www.securityfocus.com/archive/1/516397/100/0/threaded
www.securityfocus.com/bid/39065
www.vmware.com/security/advisories/VMSA-2011-0003.html
www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
www.vupen.com/english/advisories/2010/1107
www.vupen.com/english/advisories/2010/1191
www.vupen.com/english/advisories/2010/1454
www.vupen.com/english/advisories/2010/1523
www.vupen.com/english/advisories/2010/1793
www.zerodayinitiative.com/advisories/ZDI-10-056
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974