CVE Database

CVE-2010-3566

Impact: Important
Public: 2010-10-12
Bugzilla: 639922: CVE-2010-3566 OpenJDK ICC Profile remote code execution (6963489)
IAVA: 2011-A-0066

Details

The MITRE CVE dictionary describes this issue as:

Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.

Find out more about CVE-2010-3566 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 7.5
Base Metrics: AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux Server Supplementary (v. 5) (java-1.5.0-ibm) RHSA-2010:0807 October 27, 2010
Red Hat Enterprise Linux Server Supplementary (v. 5) (java-1.6.0-ibm) RHSA-2010:0987 December 15, 2010
Red Hat Enterprise Linux Server Supplementary (v. 5) (java-1.6.0-sun) RHSA-2010:0770 October 14, 2010
Red Hat Enterprise Linux Supplementary version 6 (java-1.5.0-ibm) RHSA-2010:0873 November 10, 2010
Red Hat Enterprise Linux Supplementary version 6 (java-1.6.0-ibm) RHSA-2010:0987 December 15, 2010
Red Hat Enterprise Linux version 4 Extras (java-1.5.0-ibm) RHSA-2010:0807 October 27, 2010
Red Hat Enterprise Linux version 4 Extras (java-1.6.0-ibm) RHSA-2010:0987 December 15, 2010
Red Hat Enterprise Linux version 4 Extras (java-1.6.0-sun) RHSA-2010:0770 October 14, 2010
Red Hat Satellite 5.4 (RHEL v.5) (java-1.6.0-ibm) RHSA-2011:0880 June 16, 2011

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.