2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2010-4452" ,
"sourceIdentifier" : "secalert_us@oracle.com" ,
"published" : "2011-02-17T19:00:01.260" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:20:58.683" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Unspecified vulnerability in the Deployment component in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad no especificada en el componente Deployment en Java Runtime Environment (JRE) en Oracle Jave SE y Java for Business v6 Update v23 y anteriores permite a aplicaciones remotas Java Web Start no confiables y applets Java no confiables vulnerar la confidencialidad, integridad y disponibilidad a trav\u00e9s de vectores desconocidos."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 10.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.6.0" ,
"matchCriteriaId" : "0863352B-4389-466F-9240-90944DB1B932"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CBCD143C-057D-4F42-B487-46801E14ACF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*" ,
"matchCriteriaId" : "09027C19-D442-446F-B7A8-21DB6787CF43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A0FEC28-0707-4F42-9740-78F3D2D551EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*" ,
"matchCriteriaId" : "C3C5879A-A608-4230-9DC1-C27F0F48A13B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*" ,
"matchCriteriaId" : "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*" ,
"matchCriteriaId" : "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*" ,
"matchCriteriaId" : "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*" ,
"matchCriteriaId" : "AADBB4F9-E43E-428B-9979-F47A15696C85"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*" ,
"matchCriteriaId" : "49260B94-05DE-4B78-9068-6F5F6BFDD19E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*" ,
"matchCriteriaId" : "C4FDE9EB-08FE-436E-A265-30E83B15DB23"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*" ,
"matchCriteriaId" : "7158D2C0-E9AC-4CD6-B777-EA7B7A181997"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*" ,
"matchCriteriaId" : "B08C075B-9FC0-4381-A9E4-FFF0362BD308"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*" ,
"matchCriteriaId" : "F587E635-3A15-4186-B6A1-F99BE0A56820"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*" ,
"matchCriteriaId" : "188D2242-7D16-4F8E-AB61-4663804AAC17"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*" ,
"matchCriteriaId" : "90EC6C13-4B37-48E5-8199-A702A944D5A6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*" ,
"matchCriteriaId" : "2528152C-E20A-4D97-931C-A5EC3CEAA06D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*" ,
"matchCriteriaId" : "A99DAB4C-272B-4C91-BC70-7729E1152590"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*" ,
"matchCriteriaId" : "30DFC10A-A4D9-4F89-B17C-AB9260087D29"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*" ,
"matchCriteriaId" : "272A5C44-18EC-41A9-8233-E9D4D0734EA6"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.6.0" ,
"matchCriteriaId" : "F647BC01-31B7-4FF9-B77B-FD4F5B3E708D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A3A4FEC7-A4A0-4B5C-A56C-8F80AE19865E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*" ,
"matchCriteriaId" : "722A93D8-B5BC-42F3-92A2-E424F61269A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*" ,
"matchCriteriaId" : "775F2611-F11C-4B84-8F40-0D034B81BF18"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*" ,
"matchCriteriaId" : "F20FDD9F-FF45-48BC-9207-54FB02E76071"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*" ,
"matchCriteriaId" : "9FA326F5-894A-4B01-BCA3-B126DA81CA59"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*" ,
"matchCriteriaId" : "228AB7B4-4BA4-43D4-B562-D438884DB152"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*" ,
"matchCriteriaId" : "AFD5C688-2103-4D60-979E-D9BE69A989C3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*" ,
"matchCriteriaId" : "21421215-F722-4207-A2E5-E2DF4B29859B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*" ,
"matchCriteriaId" : "BFB9EA23-0EF7-4582-A265-3F5AA9EC81B0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*" ,
"matchCriteriaId" : "C367B418-659E-4627-B1F1-1B1216C99055"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD5E6D4E-DDDD-4B45-B5E9-F8A916287AF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*" ,
"matchCriteriaId" : "7358492A-491C-491E-AEDF-63CB82619BAA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*" ,
"matchCriteriaId" : "C3DACAAF-AFDC-4391-9E85-344F30937F76"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*" ,
"matchCriteriaId" : "ECEDE405-CEF6-4E52-A8AE-28B9274B2289"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*" ,
"matchCriteriaId" : "D98175BF-B084-4FA5-899D-9E80DC3923EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*" ,
"matchCriteriaId" : "820632CE-F8DF-47EE-B716-7530E60008B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*" ,
"matchCriteriaId" : "D54AB785-E9B7-47BD-B756-0C3A629D67DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9412098-0353-4F7B-9245-010557E6C651"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*" ,
"matchCriteriaId" : "AD30DAEB-4893-41CF-A455-B69C463B9337"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*" ,
"matchCriteriaId" : "21D6CE7E-A036-496C-8E08-A87F62B5290A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2" ,
"source" : "secalert_us@oracle.com"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2" ,
"source" : "secalert_us@oracle.com"
} ,
2024-11-22 11:14:00 +00:00
{
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2" ,
"source" : "secalert_us@oracle.com"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/44954" ,
"source" : "secalert_us@oracle.com"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securityreason.com/securityalert/8145" ,
"source" : "secalert_us@oracle.com"
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" ,
"source" : "secalert_us@oracle.com"
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" ,
"source" : "secalert_us@oracle.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0282.html" ,
"source" : "secalert_us@oracle.com"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0880.html" ,
"source" : "secalert_us@oracle.com"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12927" ,
"source" : "secalert_us@oracle.com"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14230" ,
"source" : "secalert_us@oracle.com"
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/44954" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://securityreason.com/securityalert/8145" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0282.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0880.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12927" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14230" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}