rhsa-2011_0176
Vulnerability from csaf_redhat
Published
2011-01-25 16:16
Modified
2024-11-22 04:04
Summary
Red Hat Security Advisory: java-1.6.0-openjdk security update
Notes
Topic
Updated java-1.6.0-openjdk packages that fix two security issues are now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
These packages provide the OpenJDK 6 Java Runtime Environment and the
OpenJDK 6 Software Development Kit. The javaws command can be used to
launch Java Web Start applications.
A public static field declaration allowed untrusted JNLP (Java Network
Launching Protocol) applications to read privileged data. A remote attacker
could directly or indirectly read the values of restricted system
properties, such as "user.name", "user.home", and "java.home", which
untrusted applications should not be allowed to read. (CVE-2010-3860)
It was found that JNLPSecurityManager could silently return without
throwing an exception when permission was denied. If the javaws command was
used to launch a Java Web Start application that relies on this exception
being thrown, it could result in that application being run with elevated
privileges, allowing it to bypass security manager restrictions and gain
access to privileged functionality. (CVE-2010-4351)
Note: The RHSA-2010:0339 java-1.6.0-openjdk update installed javaws by
mistake. As part of the fixes for CVE-2010-3860 and CVE-2010-4351, this
update removes javaws.
Red Hat would like to thank the TippingPoint Zero Day Initiative project
for reporting CVE-2010-4351. The original issue reporter wishes to stay
anonymous.
This erratum also upgrades the OpenJDK package to IcedTea6 1.7.7. Refer to
the NEWS file, linked to in the References, for further information.
All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit. The javaws command can be used to\nlaunch Java Web Start applications.\n\nA public static field declaration allowed untrusted JNLP (Java Network\nLaunching Protocol) applications to read privileged data. A remote attacker\ncould directly or indirectly read the values of restricted system\nproperties, such as \"user.name\", \"user.home\", and \"java.home\", which\nuntrusted applications should not be allowed to read. (CVE-2010-3860)\n\nIt was found that JNLPSecurityManager could silently return without\nthrowing an exception when permission was denied. If the javaws command was\nused to launch a Java Web Start application that relies on this exception\nbeing thrown, it could result in that application being run with elevated\nprivileges, allowing it to bypass security manager restrictions and gain\naccess to privileged functionality. (CVE-2010-4351)\n\nNote: The RHSA-2010:0339 java-1.6.0-openjdk update installed javaws by\nmistake. As part of the fixes for CVE-2010-3860 and CVE-2010-4351, this\nupdate removes javaws.\n\nRed Hat would like to thank the TippingPoint Zero Day Initiative project\nfor reporting CVE-2010-4351. The original issue reporter wishes to stay\nanonymous.\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.7.7. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0176", "url": "https://access.redhat.com/errata/RHSA-2011:0176" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.7/file/af20d64bc8b9/NEWS", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.7/file/af20d64bc8b9/NEWS" }, { "category": "external", "summary": "645843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645843" }, { "category": "external", "summary": "663680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663680" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0176.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security update", "tracking": { "current_release_date": "2024-11-22T04:04:44+00:00", "generator": { "date": "2024-11-22T04:04:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0176", "initial_release_date": "2011-01-25T16:16:00+00:00", "revision_history": [ { "date": "2011-01-25T16:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-01-25T11:20:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:04:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.17.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.17.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.17.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.17.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.17.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.17.b17.el5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.17.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.17.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.17.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.17.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.17.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.17.b17.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.17.b17.el5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3860", "discovery_date": "2010-10-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "645843" } ], "notes": [ { "category": "description", "text": "IcedTea 1.7.x before 1.7.6, 1.8.x before 1.8.3, and 1.9.x before 1.9.2, as based on OpenJDK 6, declares multiple sensitive variables as public, which allows remote attackers to obtain sensitive information including (1) user.name, (2) user.home, and (3) java.home system properties, and other sensitive information such as installation directories.", "title": "Vulnerability description" }, { "category": "summary", "text": "IcedTea System property information leak via public static", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3860" }, { "category": "external", "summary": "RHBZ#645843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3860", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3860" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3860", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3860" } ], "release_date": "2010-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-25T16:16:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "IcedTea System property information leak via public static" }, { "acknowledgments": [ { "names": [ "TippingPoint Zero Day Initiative project" ] } ], "cve": "CVE-2010-4351", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2010-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "663680" } ], "notes": [ { "category": "description", "text": "The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader.", "title": "Vulnerability description" }, { "category": "summary", "text": "IcedTea jnlp security manager bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4351" }, { "category": "external", "summary": "RHBZ#663680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663680" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4351", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4351" } ], "release_date": "2011-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-25T16:16:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.17.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.17.b17.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "IcedTea jnlp security manager bypass" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.