7.9 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.944 High
EPSS
Percentile
99.2%
Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3
protocols. If an attacker could perform a machine-in-the-middle attack at the
start of a TLS connection, the attacker could inject arbitrary content
at the beginning of the user’s session. (CVE-2009-3555)
It was discovered that Loader-constraint table, Policy/PolicyFile,
Inflater/Deflater, drag/drop access, and deserialization did not correctly
handle certain sensitive objects. If a user were tricked into running a
specially crafted applet, private information could be leaked to a remote
attacker, leading to a loss of privacy. (CVE-2010-0082, CVE-2010-0084,
CVE-2010-0085, CVE-2010-0088, CVE-2010-0091, CVE-2010-0094)
It was discovered that AtomicReferenceArray, System.arraycopy,
InetAddress, and HashAttributeSet did not correctly handle certain
situations. If a remote attacker could trigger specific error conditions,
a Java application could crash, leading to a denial of service.
(CVE-2010-0092, CVE-2010-0093, CVE-2010-0095, CVE-2010-0845)
It was discovered that Pack200, CMM readMabCurveData, ImagingLib, and
the AWT library did not correctly check buffer lengths. If a user or
automated system were tricked into handling specially crafted JAR files or
images, a remote attacker could crash the Java application or possibly
gain user privileges (CVE-2010-0837, CVE-2010-0838, CVE-2010-0847,
CVE-2010-0848).
It was discovered that applets did not correctly handle certain trust
chains. If a user were tricked into running a specially crafted applet,
a remote attacker could possibly run untrusted code with user privileges.
(CVE-2010-0840)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 9.10 | noarch | openjdk-6-jre | <Â 6b16-1.6.1-3ubuntu3 | UNKNOWN |
Ubuntu | 9.10 | noarch | icedtea-6-jre-cacao | <Â 6b16-1.6.1-3ubuntu3 | UNKNOWN |
Ubuntu | 9.10 | noarch | icedtea6-plugin | <Â 6b16-1.6.1-3ubuntu3 | UNKNOWN |
Ubuntu | 9.10 | noarch | openjdk-6-dbg | <Â 6b16-1.6.1-3ubuntu3 | UNKNOWN |
Ubuntu | 9.10 | noarch | openjdk-6-demo | <Â 6b16-1.6.1-3ubuntu3 | UNKNOWN |
Ubuntu | 9.10 | noarch | openjdk-6-jdk | <Â 6b16-1.6.1-3ubuntu3 | UNKNOWN |
Ubuntu | 9.10 | noarch | openjdk-6-jre-headless | <Â 6b16-1.6.1-3ubuntu3 | UNKNOWN |
Ubuntu | 9.10 | noarch | openjdk-6-jre-zero | <Â 6b16-1.6.1-3ubuntu3 | UNKNOWN |
Ubuntu | 9.10 | noarch | openjdk-6-jre-lib | <Â 6b16-1.6.1-3ubuntu3 | UNKNOWN |
Ubuntu | 9.04 | noarch | openjdk-6-jre | <Â 6b14-1.4.1-0ubuntu13 | UNKNOWN |
ubuntu.com/security/CVE-2009-3555
ubuntu.com/security/CVE-2010-0082
ubuntu.com/security/CVE-2010-0084
ubuntu.com/security/CVE-2010-0085
ubuntu.com/security/CVE-2010-0088
ubuntu.com/security/CVE-2010-0091
ubuntu.com/security/CVE-2010-0092
ubuntu.com/security/CVE-2010-0093
ubuntu.com/security/CVE-2010-0094
ubuntu.com/security/CVE-2010-0095
ubuntu.com/security/CVE-2010-0837
ubuntu.com/security/CVE-2010-0838
ubuntu.com/security/CVE-2010-0840
ubuntu.com/security/CVE-2010-0845
ubuntu.com/security/CVE-2010-0847
ubuntu.com/security/CVE-2010-0848