Vulnerability CVE-2010-1423


Published: 2010-04-15   Modified: 2012-02-13

Description:
Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote attackers to execute arbitrary code via the (1) -J or (2) -XXaltjvm argument to javaws.exe, which is processed by the launch method. NOTE: some of these details are obtained from third party information.

See advisories in our WLB2 database:
Topic
Author
Date
High
Java Deployment Toolkit Performs Insufficient Validation of Parameters
taviso
10.04.2010

Type:

CWE-78

(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') )

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Oracle -> JDK 
Oracle -> JRE 

 References:
http://www.kb.cert.org/vuls/id/886582
http://www.vupen.com/english/advisories/2010/0853
http://xforce.iss.net/xforce/xfdb/57615
http://www.securitytracker.com/id?1023840
http://www.reversemode.com/index.php?option=com_content&task=view&id=67&Itemid=1
http://secunia.com/advisories/39260
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14090
http://osvdb.org/63648
http://lists.grok.org.uk/pipermail/full-disclosure/2010-April/074036.html

Copyright 2024, cxsecurity.com

 

Back to Top