CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
96.9%
Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
Vendor | Product | Version | CPE |
---|---|---|---|
sun | jre | 1.6.0 | cpe:/a:sun:jre:1.6.0::: |
sun | jre | 1.6.0 | cpe:/a:sun:jre:1.6.0:update_19:: |
sun | jre | 1.6.0 | cpe:/a:sun:jre:1.6.0:update_18:: |
sun | jre | 1.6.0 | cpe:/a:sun:jre:1.6.0:update_15:: |
sun | jre | 1.6.0 | cpe:/a:sun:jre:1.6.0:update_4:: |
sun | jre | 1.6.0 | cpe:/a:sun:jre:1.6.0:update_16:: |
sun | jre | 1.6.0 | cpe:/a:sun:jre:1.6.0:update_6:: |
sun | jre | 1.6.0 | cpe:/a:sun:jre:1.6.0:update_2:: |
sun | jre | 1.6.0 | cpe:/a:sun:jre:1.6.0:update_12:: |
sun | jre | 1.6.0 | cpe:/a:sun:jre:1.6.0:update_3:: |
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html
lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html
lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
marc.info/?l=bugtraq&m=134254866602253&w=2
secunia.com/advisories/41967
secunia.com/advisories/41972
secunia.com/advisories/42974
secunia.com/advisories/44954
security.gentoo.org/glsa/glsa-201406-32.xml
support.avaya.com/css/P8/documents/100114315
support.avaya.com/css/P8/documents/100114327
support.avaya.com/css/P8/documents/100123193
www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
www.redhat.com/support/errata/RHSA-2010-0768.html
www.redhat.com/support/errata/RHSA-2010-0770.html
www.redhat.com/support/errata/RHSA-2010-0807.html
www.redhat.com/support/errata/RHSA-2010-0865.html
www.redhat.com/support/errata/RHSA-2010-0873.html
www.redhat.com/support/errata/RHSA-2010-0987.html
www.redhat.com/support/errata/RHSA-2011-0880.html
www.securityfocus.com/archive/1/516397/100/0/threaded
www.ubuntu.com/usn/USN-1010-1
www.vmware.com/security/advisories/VMSA-2011-0003.html
bugzilla.redhat.com/show_bug.cgi?id=642202
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11990
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12220