CVE-2010-3574
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/10/2010
Last modified:
11/04/2025
Description
Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:* | 1.6.0 (including) | |
| cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
- http://marc.info/?l=bugtraq&m=134254866602253&w=2
- http://secunia.com/advisories/41967
- http://secunia.com/advisories/41972
- http://secunia.com/advisories/42377
- http://secunia.com/advisories/42432
- http://secunia.com/advisories/42974
- http://secunia.com/advisories/44954
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://support.avaya.com/css/P8/documents/100114315
- http://support.avaya.com/css/P8/documents/100114327
- http://support.avaya.com/css/P8/documents/100123193
- http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html
- http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
- http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
- http://www.redhat.com/support/errata/RHSA-2010-0768.html
- http://www.redhat.com/support/errata/RHSA-2010-0770.html
- http://www.redhat.com/support/errata/RHSA-2010-0807.html
- http://www.redhat.com/support/errata/RHSA-2010-0865.html
- http://www.redhat.com/support/errata/RHSA-2010-0873.html
- http://www.redhat.com/support/errata/RHSA-2010-0935.html
- http://www.redhat.com/support/errata/RHSA-2010-0987.html
- http://www.redhat.com/support/errata/RHSA-2011-0152.html
- http://www.redhat.com/support/errata/RHSA-2011-0880.html
- http://www.securityfocus.com/archive/1/516397/100/0/threaded
- http://www.securityfocus.com/bid/44011
- http://www.ubuntu.com/usn/USN-1010-1
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
- http://www.vupen.com/english/advisories/2010/3086
- http://www.vupen.com/english/advisories/2010/3112
- http://www.vupen.com/english/advisories/2011/0134
- http://www.vupen.com/english/advisories/2011/0143
- https://bugzilla.redhat.com/show_bug.cgi?id=642215
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12367
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12462
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
- http://marc.info/?l=bugtraq&m=134254866602253&w=2
- http://secunia.com/advisories/41967
- http://secunia.com/advisories/41972
- http://secunia.com/advisories/42377
- http://secunia.com/advisories/42432
- http://secunia.com/advisories/42974
- http://secunia.com/advisories/44954
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://support.avaya.com/css/P8/documents/100114315
- http://support.avaya.com/css/P8/documents/100114327
- http://support.avaya.com/css/P8/documents/100123193
- http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html
- http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
- http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
- http://www.redhat.com/support/errata/RHSA-2010-0768.html
- http://www.redhat.com/support/errata/RHSA-2010-0770.html
- http://www.redhat.com/support/errata/RHSA-2010-0807.html
- http://www.redhat.com/support/errata/RHSA-2010-0865.html
- http://www.redhat.com/support/errata/RHSA-2010-0873.html
- http://www.redhat.com/support/errata/RHSA-2010-0935.html
- http://www.redhat.com/support/errata/RHSA-2010-0987.html
- http://www.redhat.com/support/errata/RHSA-2011-0152.html
- http://www.redhat.com/support/errata/RHSA-2011-0880.html
- http://www.securityfocus.com/archive/1/516397/100/0/threaded
- http://www.securityfocus.com/bid/44011
- http://www.ubuntu.com/usn/USN-1010-1
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
- http://www.vupen.com/english/advisories/2010/3086
- http://www.vupen.com/english/advisories/2010/3112
- http://www.vupen.com/english/advisories/2011/0134
- http://www.vupen.com/english/advisories/2011/0143
- https://bugzilla.redhat.com/show_bug.cgi?id=642215
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12367
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12462



