7.5
CVSSv2

CVE-2010-0841

Published: 01/04/2010 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the Java Runtime Environment that allows remote malicious users to execute arbitrary code via a JPEG image that contains subsample dimensions with large values, related to JPEGImageReader and "stepX".

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sun jre 1.6.0

sun jre

sun jdk 1.6.0

sun jdk

sun jdk 1.5.0

sun sdk 1.4.2_10

sun sdk 1.4.2_11

sun sdk 1.4.2_18

sun sdk 1.4.2_19

sun sdk 1.4.2

sun sdk 1.4.2_14

sun sdk 1.4.2_15

sun sdk 1.4.2_5

sun sdk 1.4.2_6

sun sdk 1.4.2_23

sun sdk 1.4.2_24

sun sdk

sun sdk 1.4.2_02

sun sdk 1.4.2_1

sun sdk 1.4.2_16

sun sdk 1.4.2_17

sun sdk 1.4.2_7

sun sdk 1.4.2_8

sun sdk 1.4.2_9

sun sdk 1.4.2_20

sun sdk 1.4.2_12

sun sdk 1.4.2_13

sun sdk 1.4.2_3

sun sdk 1.4.2_4

sun sdk 1.4.2_21

sun sdk 1.4.2_22

sun jre 1.5.0

sun jre 1.4.2_6

sun jre 1.4.2_7

sun jre 1.4.2_13

sun jre 1.4.2_14

sun jre 1.4.2_22

sun jre 1.4.2_23

sun jre 1.4.2

sun jre 1.4.2_1

sun jre 1.4.2_8

sun jre 1.4.2_9

sun jre 1.4.2_15

sun jre 1.4.2_16

sun jre 1.4.2_24

sun jre 1.4.2_2

sun jre 1.4.2_3

sun jre 1.4.2_10

sun jre 1.4.2_17

sun jre 1.4.2_18

sun jre 1.4.2_19

sun jre 1.4.2_4

sun jre 1.4.2_5

sun jre 1.4.2_11

sun jre 1.4.2_12

sun jre 1.4.2_20

sun jre 1.4.2_21

Vendor Advisories

Synopsis Critical: java-160-sun security update Type/Severity Security Advisory: Critical Topic Updated java-160-sun packages that correct several security issues arenow available for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThe Red Hat Security Response Team has rated this update as having ...
Synopsis Critical: java-150-sun security update Type/Severity Security Advisory: Critical Topic The java-150-sun packages as shipped in Red Hat Enterprise Linux 4 Extrasand 5 Supplementary contain security flaws and should not be usedThe Red Hat Security Response Team has rated this update as having cr ...
Synopsis Critical: java-142-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-142-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4Extras, and Red Hat Enterprise Linux 5 SupplementaryThe Red Ha ...
Synopsis Moderate: java-142-ibm-sap security update Type/Severity Security Advisory: Moderate Topic Updated java-142-ibm-sap packages that fix several security issues arenow available for Red Hat Enterprise Linux 4 and 5 for SAPThe Red Hat Security Response Team has rated this update as having moderate ...

References

NVD-CWE-noinfohttp://www.redhat.com/support/errata/RHSA-2010-0337.htmlhttp://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0338.htmlhttp://www.zerodayinitiative.com/advisories/ZDI-10-054/http://secunia.com/advisories/39317http://secunia.com/advisories/39659http://www.redhat.com/support/errata/RHSA-2010-0383.htmlhttp://lists.apple.com/archives/security-announce/2010//May/msg00002.htmlhttp://www.securityfocus.com/bid/39067http://www.vupen.com/english/advisories/2010/1191http://secunia.com/advisories/39819http://support.apple.com/kb/HT4171http://lists.apple.com/archives/security-announce/2010//May/msg00001.htmlhttp://support.apple.com/kb/HT4170http://www.vupen.com/english/advisories/2010/1454http://www.redhat.com/support/errata/RHSA-2010-0471.htmlhttp://secunia.com/advisories/40211http://www.redhat.com/support/errata/RHSA-2010-0489.htmlhttp://www.vupen.com/english/advisories/2010/1523http://secunia.com/advisories/40545http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751http://www.vupen.com/english/advisories/2010/1793http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.htmlhttp://secunia.com/advisories/43308http://www.vmware.com/security/advisories/VMSA-2011-0003.htmlhttp://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.htmlhttp://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.htmlhttp://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.htmlhttp://marc.info/?l=bugtraq&m=134254866602253&w=2http://marc.info/?l=bugtraq&m=127557596201693&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14144http://www.securityfocus.com/archive/1/516397/100/0/threadedhttp://www.securityfocus.com/archive/1/510531/100/0/threadedhttps://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2010:0337