Lucene search

K
ubuntuUbuntuUSN-923-1
HistoryApr 07, 2010 - 12:00 a.m.

OpenJDK vulnerabilities

2010-04-0700:00:00
ubuntu.com
48

7.9 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.944 High

EPSS

Percentile

99.2%

Releases

  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04

Packages

  • openjdk-6 -

Details

Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3
protocols. If an attacker could perform a machine-in-the-middle attack at the
start of a TLS connection, the attacker could inject arbitrary content
at the beginning of the user’s session. (CVE-2009-3555)

It was discovered that Loader-constraint table, Policy/PolicyFile,
Inflater/Deflater, drag/drop access, and deserialization did not correctly
handle certain sensitive objects. If a user were tricked into running a
specially crafted applet, private information could be leaked to a remote
attacker, leading to a loss of privacy. (CVE-2010-0082, CVE-2010-0084,
CVE-2010-0085, CVE-2010-0088, CVE-2010-0091, CVE-2010-0094)

It was discovered that AtomicReferenceArray, System.arraycopy,
InetAddress, and HashAttributeSet did not correctly handle certain
situations. If a remote attacker could trigger specific error conditions,
a Java application could crash, leading to a denial of service.
(CVE-2010-0092, CVE-2010-0093, CVE-2010-0095, CVE-2010-0845)

It was discovered that Pack200, CMM readMabCurveData, ImagingLib, and
the AWT library did not correctly check buffer lengths. If a user or
automated system were tricked into handling specially crafted JAR files or
images, a remote attacker could crash the Java application or possibly
gain user privileges (CVE-2010-0837, CVE-2010-0838, CVE-2010-0847,
CVE-2010-0848).

It was discovered that applets did not correctly handle certain trust
chains. If a user were tricked into running a specially crafted applet,
a remote attacker could possibly run untrusted code with user privileges.
(CVE-2010-0840)

OSVersionArchitecturePackageVersionFilename
Ubuntu9.10noarchopenjdk-6-jre< 6b16-1.6.1-3ubuntu3UNKNOWN
Ubuntu9.10noarchicedtea-6-jre-cacao< 6b16-1.6.1-3ubuntu3UNKNOWN
Ubuntu9.10noarchicedtea6-plugin< 6b16-1.6.1-3ubuntu3UNKNOWN
Ubuntu9.10noarchopenjdk-6-dbg< 6b16-1.6.1-3ubuntu3UNKNOWN
Ubuntu9.10noarchopenjdk-6-demo< 6b16-1.6.1-3ubuntu3UNKNOWN
Ubuntu9.10noarchopenjdk-6-jdk< 6b16-1.6.1-3ubuntu3UNKNOWN
Ubuntu9.10noarchopenjdk-6-jre-headless< 6b16-1.6.1-3ubuntu3UNKNOWN
Ubuntu9.10noarchopenjdk-6-jre-zero< 6b16-1.6.1-3ubuntu3UNKNOWN
Ubuntu9.10noarchopenjdk-6-jre-lib< 6b16-1.6.1-3ubuntu3UNKNOWN
Ubuntu9.04noarchopenjdk-6-jre< 6b14-1.4.1-0ubuntu13UNKNOWN
Rows per page:
1-10 of 311

7.9 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.944 High

EPSS

Percentile

99.2%