CVE-2010-0840

critical

Description

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."

References

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971

http://www.zerodayinitiative.com/advisories/ZDI-10-056

http://www.vupen.com/english/advisories/2010/1793

http://www.vupen.com/english/advisories/2010/1523

http://www.vupen.com/english/advisories/2010/1454

http://www.vupen.com/english/advisories/2010/1191

http://www.vupen.com/english/advisories/2010/1107

http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html

http://www.vmware.com/security/advisories/VMSA-2011-0003.html

http://www.securityfocus.com/bid/39065

http://www.securityfocus.com/archive/1/516397/100/0/threaded

http://www.securityfocus.com/archive/1/510528/100/0/threaded

http://www.redhat.com/support/errata/RHSA-2010-0489.html

http://www.redhat.com/support/errata/RHSA-2010-0471.html

http://www.redhat.com/support/errata/RHSA-2010-0383.html

http://www.redhat.com/support/errata/RHSA-2010-0339.html

http://www.redhat.com/support/errata/RHSA-2010-0338.html

http://www.redhat.com/support/errata/RHSA-2010-0337.html

http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html

http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html

http://www.mandriva.com/security/advisories?name=MDVSA-2010:084

http://ubuntu.com/usn/usn-923-1

http://support.apple.com/kb/HT4171

http://support.apple.com/kb/HT4170

http://secunia.com/advisories/43308

http://secunia.com/advisories/40545

http://secunia.com/advisories/40211

http://secunia.com/advisories/39819

http://secunia.com/advisories/39659

http://secunia.com/advisories/39317

http://secunia.com/advisories/39292

http://marc.info/?l=bugtraq&m=134254866602253&w=2

http://marc.info/?l=bugtraq&m=127557596201693&w=2

http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html

http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html

http://lists.apple.com/archives/security-announce/2010//May/msg00002.html

http://lists.apple.com/archives/security-announce/2010//May/msg00001.html

http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751

Details

Source: Mitre, NVD

Published: 2010-04-01

Updated: 2018-10-30

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical