Vulnerability CVE-2010-4351


Published: 2011-01-20   Modified: 2012-02-13

Description:
The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

Vendor: Redhat
Product: Icedtea 
Version:
1.9.3
1.9.2
1.9.1
1.9
1.8.3
1.8.2
1.8.1
1.8
1.7.6
1.7.5
1.7.4
1.7.3
1.7.2
1.7.1
1.7

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=663680
http://xforce.iss.net/xforce/xfdb/64893
http://www.zerodayinitiative.com/advisories/ZDI-11-014/
http://www.vupen.com/english/advisories/2011/0239
http://www.vupen.com/english/advisories/2011/0215
http://www.vupen.com/english/advisories/2011/0166
http://www.vupen.com/english/advisories/2011/0165
http://www.ubuntu.com/usn/USN-1055-1
http://www.ubuntu.com/usn/USN-1052-1
http://www.securityfocus.com/bid/45894
http://www.redhat.com/support/errata/RHSA-2011-0176.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:054
http://www.debian.org/security/2011/dsa-2224
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://secunia.com/advisories/43135
http://secunia.com/advisories/43085
http://secunia.com/advisories/43078
http://secunia.com/advisories/43002
http://osvdb.org/70605
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053288.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053276.html
http://blog.fuseyism.com/index.php/2011/01/18/security-icedtea6-177-184-194-released/

Related CVE
CVE-2019-3889
A reflected XSS vulnerability exists in authorization flow of OpenShift Container Platform versions: openshift-online-3, openshift-enterprise-3.4 through 3.7 and openshift-enterprise-3.9 through 3.11. An attacker could use this flaw to steal authoriz...
CVE-2019-10194
Sensitive passwords used in deployment and configuration of oVirt Metrics, all versions. were found to be insufficiently protected. Passwords could be disclosed in log files (if playbooks are run with -v) or in playbooks stored on Metrics or Bastion ...
CVE-2019-10193
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perfo...
CVE-2019-10192
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis...
CVE-2018-11307
An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.
CVE-2019-13314
virt-bootstrap 1.1.0 allows local users to discover a root password by listing a process, because this password may be present in the --root-password option to virt_bootstrap.py.
CVE-2019-10183
Virt-install(1) utility used to provision new virtual machines has introduced an option '--unattended' to create VMs without user interaction. This option accepts guest VM password as command line arguments, thus leaking them to others users on the s...
CVE-2019-10137
A path traversal flaw was found in spacewalk-proxy, all versions through 2.9, in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to...

Copyright 2019, cxsecurity.com

 

Back to Top