2024-04-04 08:46:00 +00:00

277 lines
9.6 KiB
JSON

{
"id": "CVE-2010-0843",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2010-04-01T16:30:00.983",
"lastModified": "2018-10-10T19:54:22.113",
"vulnStatus": "Modified",
"evaluatorComment": "Per: http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html\r\n\r\n\r\n\r\n'Affected product releases and versions:\r\n\u2022 Java SE: \t \r\n\r\n \u2022 JDK and JRE 6 Update 18 and earlier for Windows, Solaris, and Linux\r\n\t \r\n\r\n \u2022 JDK 5.0 Update 23 and earlier for Solaris\r\n\t \r\n\r\n \u2022 SDK 1.4.2_25 and earlier for Solaris\r\n\t \r\n\u2022 Java for Business: \t \r\n\r\n \u2022 JDK and JRE 6 Update 18 and earlier for Windows, Solaris and Linux\r\n\t \r\n\r\n \u2022 JDK and JRE 5.0 Update 23 and earlier for Windows, Solaris and Linux\r\n\t \r\n\r\n \u2022 SDK and JRE 1.4.2_25 and earlier for Windows, Solaris and Linux'",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to XNewPtr and improper handling of an integer parameter when allocating heap memory in the com.sun.media.sound libraries, which allows remote attackers to execute arbitrary code."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el componente Sound en Oracle Java SE y Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25 y 1.3.1_27 permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad a trav\u00e9s de vectores desconocidos. NOTA: la informaci\u00f3n previa fue obtenida de la CPU Marzo 2010. Oracle no ha comentado sobre alegaciones de un investigador confiable de que esto est\u00e1 relacionado con XNewPtr y un manejo inadecuado de un par\u00e1metro de entero al asignar memoria din\u00e1mica en las bibliotecas com.sun.media.sound, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*",
"matchCriteriaId": "EB3A0C49-3FF9-4CB7-9E01-F771D4925103"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"matchCriteriaId": "C367B418-659E-4627-B1F1-1B1216C99055"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:jre:1.3.1_27:*:*:*:*:*:*:*",
"matchCriteriaId": "D671CFAE-B8C5-449E-9F08-189657A18B26"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*",
"matchCriteriaId": "076444F1-543E-4061-9D39-415A1A889F5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*",
"matchCriteriaId": "DE949EBF-2BC0-4355-8B28-B494023D45FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"matchCriteriaId": "C4FDE9EB-08FE-436E-A265-30E83B15DB23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_27:*:*:*:*:*:*:*",
"matchCriteriaId": "DA78C21D-2669-4107-A07B-0AA2C7B1EC16"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*",
"matchCriteriaId": "E79C04F7-E3A1-4DF5-94E9-E96A6FC61FC9"
}
]
}
]
}
],
"references": [
{
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751",
"source": "secalert_us@oracle.com"
},
{
"url": "http://lists.apple.com/archives/security-announce/2010//May/msg00001.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://lists.apple.com/archives/security-announce/2010//May/msg00002.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://marc.info/?l=bugtraq&m=127557596201693&w=2",
"source": "secalert_us@oracle.com"
},
{
"url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2",
"source": "secalert_us@oracle.com"
},
{
"url": "http://osvdb.org/63492",
"source": "secalert_us@oracle.com"
},
{
"url": "http://seclists.org/bugtraq/2010/Apr/41",
"source": "secalert_us@oracle.com"
},
{
"url": "http://secunia.com/advisories/39317",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/39659",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/39819",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/40211",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/40545",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/43308",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://support.apple.com/kb/HT4170",
"source": "secalert_us@oracle.com"
},
{
"url": "http://support.apple.com/kb/HT4171",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0337.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0338.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0383.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0471.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0489.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.securityfocus.com/bid/39083",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/1191",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2010/1454",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2010/1523",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2010/1793",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-052/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14092",
"source": "secalert_us@oracle.com"
}
]
}