fkie_cve-2010-0886
Vulnerability from fkie_nvd
Published
2010-04-20 19:30
Modified
2024-11-21 01:13
Severity ?
Summary
Unspecified vulnerability in the Java Deployment Toolkit component in Oracle Java SE and Java for Business JDK and JRE 6 Update 10 through 19 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
References
secalert_us@oracle.comhttp://lists.apple.com/archives/security-announce/2010//May/msg00001.html
secalert_us@oracle.comhttp://lists.apple.com/archives/security-announce/2010//May/msg00002.html
secalert_us@oracle.comhttp://marc.info/?l=bugtraq&m=134254866602253&w=2
secalert_us@oracle.comhttp://secunia.com/advisories/39819
secalert_us@oracle.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-279590-1
secalert_us@oracle.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1022294.1-1
secalert_us@oracle.comhttp://support.apple.com/kb/HT4170
secalert_us@oracle.comhttp://support.apple.com/kb/HT4171
secalert_us@oracle.comhttp://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.htmlPatch, Vendor Advisory
secalert_us@oracle.comhttp://www.securityfocus.com/archive/1/516397/100/0/threaded
secalert_us@oracle.comhttp://www.vmware.com/security/advisories/VMSA-2011-0003.html
secalert_us@oracle.comhttp://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
secalert_us@oracle.comhttp://www.vupen.com/english/advisories/2010/1191
secalert_us@oracle.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14216
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=134254866602253&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39819
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-279590-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1022294.1-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4170
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4171
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/516397/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2011-0003.html
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1191
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14216
Impacted products
Vendor Product Version
sun jre 1.6.0
sun jre 1.6.0
sun jre 1.6.0
sun jre 1.6.0
sun jre 1.6.0
sun jre 1.6.0
sun jre 1.6.0
sun jre 1.6.0
sun jre 1.6.0
sun jre 1.6.0
microsoft windows *
sun jdk 1.6.0
sun jdk 1.6.0
sun jdk 1.6.0
sun jdk 1.6.0
sun jdk 1.6.0
sun jdk 1.6.0
sun jdk 1.6.0
sun jdk 1.6.0
sun jdk 1.6.0
sun jdk 1.6.0
microsoft windows *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:jre:1.6.0:update10:*:*:*:*:*:*",
              "matchCriteriaId": "B6339EF9-97AC-4675-9971-7435A4B31432",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.6.0:update11:*:*:*:*:*:*",
              "matchCriteriaId": "6D1626F8-26F4-4EC5-A486-98808372425F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.6.0:update12:*:*:*:*:*:*",
              "matchCriteriaId": "FA1BFE3B-3773-426B-9E69-250249E059C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.6.0:update13:*:*:*:*:*:*",
              "matchCriteriaId": "46621D4B-CA2B-4EAC-884E-9CC9486F2F94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.6.0:update14:*:*:*:*:*:*",
              "matchCriteriaId": "37FED4C9-7501-4DF3-B05E-0B460CBB2D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.6.0:update15:*:*:*:*:*:*",
              "matchCriteriaId": "6958538A-0C2E-460F-A130-70515AFBB6A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.6.0:update16:*:*:*:*:*:*",
              "matchCriteriaId": "ABB1D4B3-54E6-455D-9238-B185DB012A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.6.0:update17:*:*:*:*:*:*",
              "matchCriteriaId": "F74A9B5B-60F3-4717-8572-63A0996291A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.6.0:update18:*:*:*:*:*:*",
              "matchCriteriaId": "30B78D5C-CC85-4E04-8CBA-3DFE99935A23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.6.0:update19:*:*:*:*:*:*",
              "matchCriteriaId": "864A3C15-E9EA-466A-A32D-2EAC9DD8AC6D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update10:*:*:*:*:*:*",
              "matchCriteriaId": "FE5F6E90-A942-4468-B763-9606CE073A9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update11:*:*:*:*:*:*",
              "matchCriteriaId": "B0ADF941-5E90-498D-A2E2-7DBCF5358D64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update12:*:*:*:*:*:*",
              "matchCriteriaId": "0819F015-FF7B-4C8F-B195-4CB54070BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update13:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB2234-B196-4F41-9FE9-A1896A57E575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update14:*:*:*:*:*:*",
              "matchCriteriaId": "572A693C-1EEE-4A6C-BA42-B4FB4B28D0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update15:*:*:*:*:*:*",
              "matchCriteriaId": "7A59AF0A-5335-4650-88DB-5B261FE5E308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update16:*:*:*:*:*:*",
              "matchCriteriaId": "0B955A34-DCD3-42E2-BC37-88F348EE31F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update17:*:*:*:*:*:*",
              "matchCriteriaId": "D5637276-D94D-4793-BFA7-96A66E7663C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update18:*:*:*:*:*:*",
              "matchCriteriaId": "C0552813-87CE-485D-9741-7AB336025D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update19:*:*:*:*:*:*",
              "matchCriteriaId": "21ED9D75-EC18-414C-B0B0-C27F8755E0B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Java Deployment Toolkit component in Oracle Java SE and Java for Business JDK and JRE 6 Update 10 through 19 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad sin especificar en el componente Java Deployment Toolkit en Oracle Java SE y Java para Business JDK y JRE 6 Update 10 a la 19, permite a atacantes remotos comprometer la confidencialidad, integridad y disponibilidad a trav\u00e9s de vectores desconocidos."
    }
  ],
  "evaluatorImpact": "Per: http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.html\r\n\r\n\u0027Notes:\r\n\r\n   1. Affects the Windows platform only. CVSS 10.0 score assumes running with Administrator privileges. Otherwise, CVSS score of 7.5 with Confidentiality, Integrity and Availability impacts of Partial+, Partial+ and Partial+.\u0027",
  "id": "CVE-2010-0886",
  "lastModified": "2024-11-21T01:13:09.287",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-04-20T19:30:00.333",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.apple.com/archives/security-announce/2010//May/msg00001.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.apple.com/archives/security-announce/2010//May/msg00002.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/39819"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-279590-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1022294.1-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://support.apple.com/kb/HT4170"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://support.apple.com/kb/HT4171"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.vupen.com/english/advisories/2010/1191"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//May/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//May/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39819"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-279590-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1022294.1-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14216"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.