CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
95.2%
Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow in a decoding routine used by the JPEGImageDecoderImpl interface, which allows code execution via a crafted JPEG image.
Vendor | Product | Version | CPE |
---|---|---|---|
sun | jre | * | cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:* |
sun | jre | 1.6.0 | cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:* |
sun | jre | 1.6.0 | cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* |
sun | jre | 1.6.0 | cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* |
sun | jre | 1.6.0 | cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* |
sun | jre | 1.6.0 | cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* |
sun | jre | 1.6.0 | cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* |
sun | jre | 1.6.0 | cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* |
sun | jre | 1.6.0 | cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* |
sun | jre | 1.6.0 | cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* |
itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
lists.apple.com/archives/security-announce/2010//May/msg00001.html
lists.apple.com/archives/security-announce/2010//May/msg00002.html
lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
marc.info/?l=bugtraq&m=127557596201693&w=2
marc.info/?l=bugtraq&m=134254866602253&w=2
secunia.com/advisories/39317
secunia.com/advisories/39659
secunia.com/advisories/39819
secunia.com/advisories/40211
secunia.com/advisories/40545
secunia.com/advisories/43308
support.apple.com/kb/HT4170
support.apple.com/kb/HT4171
www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
www.redhat.com/support/errata/RHSA-2010-0337.html
www.redhat.com/support/errata/RHSA-2010-0338.html
www.redhat.com/support/errata/RHSA-2010-0383.html
www.redhat.com/support/errata/RHSA-2010-0471.html
www.redhat.com/support/errata/RHSA-2010-0489.html
www.securityfocus.com/archive/1/510548/100/0/threaded
www.securityfocus.com/archive/1/516397/100/0/threaded
www.securityfocus.com/bid/39073
www.vmware.com/security/advisories/VMSA-2011-0003.html
www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
www.vupen.com/english/advisories/2010/1191
www.vupen.com/english/advisories/2010/1454
www.vupen.com/english/advisories/2010/1523
www.vupen.com/english/advisories/2010/1793
www.zerodayinitiative.com/advisories/ZDI-10-057/
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13795