// For flags

CVE-2010-4351

Red Hat OpenJDK IcedTea6 ClassLoader Remote Code Execution Vulnerability

Severity Score

9.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader.

El JNLP SecurityManager en IcedTea (IcedTea.so) v1.7 anteriores a v1.7.7, v1.8 anteriores a v1.8.4 y v1.9 anteriores a v1.9.4 de Java OpenJDK devuelve desde el método checkPermission una excepción en determinadas circunstancias, lo que podría permitir a atacantes dependientes del contexto eludir la política de protección establecida mediante la creación de instancias de ClassLoader.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Java OpenJDK. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The flaw exists within the IcedTea.so component. When handling the an applet the process fails to properly restrict permission of code. It is possible to create and instantiate subclasses of ClassLoader. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.

Multiple vulnerabilities has been identified and fixed in java-1.6.0-openjdk. The JNLP SecurityManager in IcedTea 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader. Unspecified vulnerability in the Java Runtime Environment in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Networking. Various other issues have also been identified and addressed.

*Credits: Anonymous
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-11-30 CVE Reserved
  • 2011-01-18 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-305: Authentication Bypass by Primary Weakness
CAPEC
References (23)
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.7
Search vendor "Redhat" for product "Icedtea" and version "1.7"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.7.1
Search vendor "Redhat" for product "Icedtea" and version "1.7.1"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.7.2
Search vendor "Redhat" for product "Icedtea" and version "1.7.2"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.7.3
Search vendor "Redhat" for product "Icedtea" and version "1.7.3"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.7.4
Search vendor "Redhat" for product "Icedtea" and version "1.7.4"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.7.5
Search vendor "Redhat" for product "Icedtea" and version "1.7.5"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.7.6
Search vendor "Redhat" for product "Icedtea" and version "1.7.6"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.8
Search vendor "Redhat" for product "Icedtea" and version "1.8"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.8.1
Search vendor "Redhat" for product "Icedtea" and version "1.8.1"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.8.2
Search vendor "Redhat" for product "Icedtea" and version "1.8.2"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.8.3
Search vendor "Redhat" for product "Icedtea" and version "1.8.3"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.9
Search vendor "Redhat" for product "Icedtea" and version "1.9"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.9.1
Search vendor "Redhat" for product "Icedtea" and version "1.9.1"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.9.2
Search vendor "Redhat" for product "Icedtea" and version "1.9.2"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe
Redhat
Search vendor "Redhat"
Icedtea
Search vendor "Redhat" for product "Icedtea"
1.9.3
Search vendor "Redhat" for product "Icedtea" and version "1.9.3"
-
Affected
in Sun
Search vendor "Sun"
Openjdk
Search vendor "Sun" for product "Openjdk"
*-
Safe