FKIE_CVE-2010-4351
Vulnerability from fkie_nvd - Published: 2011-01-20 19:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | icedtea | 1.7 | |
| redhat | icedtea | 1.7.1 | |
| redhat | icedtea | 1.7.2 | |
| redhat | icedtea | 1.7.3 | |
| redhat | icedtea | 1.7.4 | |
| redhat | icedtea | 1.7.5 | |
| redhat | icedtea | 1.7.6 | |
| redhat | icedtea | 1.8 | |
| redhat | icedtea | 1.8.1 | |
| redhat | icedtea | 1.8.2 | |
| redhat | icedtea | 1.8.3 | |
| redhat | icedtea | 1.9 | |
| redhat | icedtea | 1.9.1 | |
| redhat | icedtea | 1.9.2 | |
| redhat | icedtea | 1.9.3 | |
| sun | openjdk | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4833BFF6-1B29-4455-BA90-A11DE1F6D008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CD18B06E-F419-4ADE-B6E5-DC364A9FF6CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ED3970CE-8C3C-4F30-8927-1E5A6CD626E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E225339C-A5A8-4D56-A5EC-09814C83E0E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ADC26C27-DAD1-4DA9-A1DE-E3D5060C3EB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "557CEA5C-2B78-4BC2-ABA2-E2272D3765A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "39BB9DB4-AE61-4B74-B0AB-2363A5F4A9F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "68D8D8B4-8E82-4D08-9D39-2D94418D06E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C3AD9684-D2D7-496B-B77A-2798244CB112",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D37313-09D9-4726-B083-1FD83A602DE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFB7FF0-B2D7-43F2-86ED-0DC4966373E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "3303605E-F164-4B9F-90E5-55E47C1C568B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C448596-505E-451B-8BC5-73FCB2D11DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "39ECCC84-CA5A-44F7-B303-25BED16073B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:icedtea:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D454FC4-329C-4C70-BF31-D3F8B6CF85E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E78309B-E13F-4B65-9F59-39A993B900AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader."
},
{
"lang": "es",
"value": "El JNLP SecurityManager en IcedTea (IcedTea.so) v1.7 anteriores a v1.7.7, v1.8 anteriores a v1.8.4 y v1.9 anteriores a v1.9.4 de Java OpenJDK devuelve desde el m\u00e9todo checkPermission una excepci\u00f3n en determinadas circunstancias, lo que podr\u00eda permitir a atacantes dependientes del contexto eludir la pol\u00edtica de protecci\u00f3n establecida mediante la creaci\u00f3n de instancias de ClassLoader."
}
],
"id": "CVE-2010-4351",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-01-20T19:00:06.867",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://blog.fuseyism.com/index.php/2011/01/18/security-icedtea6-177-184-194-released/"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053276.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053288.html"
},
{
"source": "secalert@redhat.com",
"url": "http://osvdb.org/70605"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43002"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/43078"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/43085"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/43135"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2011/dsa-2224"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0176.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/45894"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1052-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1055-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0165"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0166"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2011/0215"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2011/0239"
},
{
"source": "secalert@redhat.com",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-014/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663680"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64893"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://blog.fuseyism.com/index.php/2011/01/18/security-icedtea6-177-184-194-released/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053276.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053288.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/70605"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43078"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43085"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2224"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0176.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/45894"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1052-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1055-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0165"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0166"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0215"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0239"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-014/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663680"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64893"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…