CVE-2010-3563
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/10/2010
Last modified:
29/04/2026
Description
Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to "how Web Start retrieves security policies," BasicServiceImpl, and forged policies that bypass sandbox restrictions.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:* | 1.6.0 (including) | |
| cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
- http://marc.info/?l=bugtraq&m=134254866602253&w=2
- http://secunia.com/advisories/44954
- http://support.avaya.com/css/P8/documents/100114315
- http://support.avaya.com/css/P8/documents/100123193
- http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
- http://www.redhat.com/support/errata/RHSA-2010-0770.html
- http://www.redhat.com/support/errata/RHSA-2010-0987.html
- http://www.redhat.com/support/errata/RHSA-2011-0880.html
- http://www.securityfocus.com/bid/43999
- http://www.zerodayinitiative.com/advisories/ZDI-10-202/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12181
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12554
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
- http://marc.info/?l=bugtraq&m=134254866602253&w=2
- http://secunia.com/advisories/44954
- http://support.avaya.com/css/P8/documents/100114315
- http://support.avaya.com/css/P8/documents/100123193
- http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
- http://www.redhat.com/support/errata/RHSA-2010-0770.html
- http://www.redhat.com/support/errata/RHSA-2010-0987.html
- http://www.redhat.com/support/errata/RHSA-2011-0880.html
- http://www.securityfocus.com/bid/43999
- http://www.zerodayinitiative.com/advisories/ZDI-10-202/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12181
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12554



