// For flags

CVE-2010-0840

Oracle JRE Unspecified Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."

Vulnerabilidad no especificada en el componente Java Runtime Environment en Oracle Java SE y Java for Business 6 Update 18, 5.0 Update 23 y 1.4.2_25 permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad a través de vectores desconocidos. NOTA: la información previa fue obtenida de la CPU Marzo 2010. Oracle no ha comentado sobre alegaciones de un investigador confiable de que esto está relacionado con los controles inadecuados en la ejecución de los métodos privilegiados en Java Runtime Environment (JRE), lo que permite a atacantes ejecutar código arbitrario a través de (1) un objeto no confiable que amplía la clase de confianza, pero no ha modificado un determinado método o (2) "una problema de confianza similar con las interfaces", también conocido como "Trusted Methods Chaining Remote Code Execution Vulnerability".

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sun Java Runtime. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the code responsible for ensuring proper privileged execution of methods. If an untrusted method in an applet attempts to call a method that requires privileges, Java will walk the call stack and for each entry verify that the method called is defined within a class that has that privilege. However, this does not take into account an untrusted object that has extended the trusted class without overwriting the target method. Additionally, this can be bypassed by abusing a similar trust issue with interfaces. An attacker can leverage these insecurities to execute vulnerable code under the context of the user invoking the JRE.

Unspecified vulnerability in the Java Runtime Environment (JRE) in Java SE component allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors.

*Credits: Sami Koivu
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-03-03 CVE Reserved
  • 2010-04-01 CVE Published
  • 2010-12-15 First Exploit
  • 2022-05-25 Exploited in Wild
  • 2022-06-15 KEV Due Date
  • 2024-07-04 EPSS Updated
  • 2024-08-07 CVE Updated
CWE
CAPEC
References (43)
URL Date SRC
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 2024-06-28
http://lists.apple.com/archives/security-announce/2010//May/msg00001.html 2024-06-28
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html 2024-06-28
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html 2024-06-28
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html 2024-06-28
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html 2024-06-28
http://marc.info/?l=bugtraq&m=127557596201693&w=2 2024-06-28
http://marc.info/?l=bugtraq&m=134254866602253&w=2 2024-06-28
http://secunia.com/advisories/39292 2024-06-28
http://secunia.com/advisories/39317 2024-06-28
http://secunia.com/advisories/39659 2024-06-28
http://secunia.com/advisories/39819 2024-06-28
http://secunia.com/advisories/40211 2024-06-28
http://secunia.com/advisories/40545 2024-06-28
http://secunia.com/advisories/43308 2024-06-28
http://ubuntu.com/usn/usn-923-1 2024-06-28
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 2024-06-28
http://www.redhat.com/support/errata/RHSA-2010-0337.html 2024-06-28
http://www.redhat.com/support/errata/RHSA-2010-0338.html 2024-06-28
http://www.redhat.com/support/errata/RHSA-2010-0339.html 2024-06-28
http://www.redhat.com/support/errata/RHSA-2010-0383.html 2024-06-28
http://www.redhat.com/support/errata/RHSA-2010-0471.html 2024-06-28
http://www.redhat.com/support/errata/RHSA-2010-0489.html 2024-06-28
http://www.vupen.com/english/advisories/2010/1191 2024-06-28
http://www.vupen.com/english/advisories/2010/1454 2024-06-28
http://www.vupen.com/english/advisories/2010/1523 2024-06-28
http://www.vupen.com/english/advisories/2010/1793 2024-06-28
https://access.redhat.com/security/cve/CVE-2010-0840 2010-08-02
https://bugzilla.redhat.com/show_bug.cgi?id=575846 2010-08-02
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.4.2_25
Search vendor "Oracle" for product "Jre" and version "1.4.2_25"
-
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.5.0
Search vendor "Oracle" for product "Jre" and version "1.5.0"
update23
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.6.0
Search vendor "Oracle" for product "Jre" and version "1.6.0"
update18
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
11.0
Search vendor "Opensuse" for product "Opensuse" and version "11.0"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
11.1
Search vendor "Opensuse" for product "Opensuse" and version "11.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
11.2
Search vendor "Opensuse" for product "Opensuse" and version "11.2"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
8.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "8.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
8.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "8.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
9.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "9.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
9.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "9.10"
-
Affected