Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows remote attackers to execute arbitrary code, related to an "invalid assignment" and inconsistent length values in a JPEG image encoder (JPEGImageEncoderImpl).
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
AV:N/AC:L/Au:N/C:P/I:P/A:P
Vendors | Products |
---|---|
Sun |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
|
Configuration 4 [-]
|
Configuration 5 [-]
|
Configuration 6 [-]
|
Configuration 7 [-]
|
Configuration 8 [-]
|
Configuration 9 [-]
|
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: oracle
Published: 2010-04-01T16:00:00
Updated: 2018-10-10T18:57:01
Reserved: 2010-03-03T00:00:00
Link: CVE-2010-0846
JSON object: View
NVD Information
Status : Modified
Published: 2010-04-01T16:30:01.093
Modified: 2018-10-30T16:26:21.390
Link: CVE-2010-0846
JSON object: View
Redhat Information
No data.
CWE