CVE-2010-4472
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/02/2011
Last modified:
11/04/2025
Description
Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote attackers to affect availability, related to XML Digital Signature and unspecified APIs. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue involves the replacement of the "XML DSig Transform or C14N algorithm implementations."
Impact
Base Score 2.0
2.60
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:* | 1.6.0 (including) | |
cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054115.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054134.html
- http://marc.info/?l=bugtraq&m=134254866602253&w=2
- http://marc.info/?l=bugtraq&m=134254957702612&w=2
- http://marc.info/?l=bugtraq&m=134254957702612&w=2
- http://secunia.com/advisories/43350
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://www.debian.org/security/2011/dsa-2224
- http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A054
- http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
- http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html
- http://www.redhat.com/support/errata/RHSA-2011-0281.html
- http://www.redhat.com/support/errata/RHSA-2011-0282.html
- http://www.securityfocus.com/bid/46404
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65411
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12903
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14118
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054115.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054134.html
- http://marc.info/?l=bugtraq&m=134254866602253&w=2
- http://marc.info/?l=bugtraq&m=134254957702612&w=2
- http://marc.info/?l=bugtraq&m=134254957702612&w=2
- http://secunia.com/advisories/43350
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://www.debian.org/security/2011/dsa-2224
- http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A054
- http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
- http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html
- http://www.redhat.com/support/errata/RHSA-2011-0281.html
- http://www.redhat.com/support/errata/RHSA-2011-0282.html
- http://www.securityfocus.com/bid/46404
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65411
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12903
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14118