First published: Mon Jul 19 2010(Updated: )
JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, allows attackers to perform remote code execution. This vulnerability can only be exploited when the Java Security Manager is not properly configured.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jboss-seam2 | <0:2.0.2.FP-1.ep1.24.el4 | 0:2.0.2.FP-1.ep1.24.el4 |
redhat/jboss-seam2 | <0:2.0.2.FP-1.ep1.24.el5 | 0:2.0.2.FP-1.ep1.24.el5 |
Red Hat JBoss Enterprise Application Platform | =4.3.0 | |
Red Hat Enterprise Linux | =4 | |
Red Hat Enterprise Linux | =5 | |
Red Hat JBoss Seam 2 Framework | ||
All of | ||
redhat jboss enterprise application platform | =4.3.0 | |
Any of | ||
Red Hat Enterprise Linux | =4 | |
Red Hat Enterprise Linux | =5 | |
NetApp OnCommand Balance | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Unified Manager | ||
All of | ||
=4.3.0 | ||
Any of | ||
=4 | ||
=5 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1871 has a high severity rating due to its potential for remote code execution.
To fix CVE-2010-1871, ensure that you upgrade to JBoss Seam 2 version 2.0.2.FP-1.ep1.24.el4 or el5.
CVE-2010-1871 affects systems running JBoss Seam 2 as implemented in JBoss Enterprise Application Platform 4.3.0.
The vulnerability in CVE-2010-1871 is caused by improper configuration of the Java Security Manager.
Yes, CVE-2010-1871 allows remote code execution, making it a significant threat when exploited.