First published: Tue Oct 12 2010(Updated: )
Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.6.0-sun-1:1.6.0.22-1jpp.1.el4 | 1.6.0-sun-1:1.6.0.22-1jpp.1.el4 |
redhat/java | <1.5.0-ibm-1:1.5.0.12.2-1jpp.1.el4 | 1.5.0-ibm-1:1.5.0.12.2-1jpp.1.el4 |
redhat/java | <1.6.0-ibm-1:1.6.0.9.0-1jpp.3.el4 | 1.6.0-ibm-1:1.6.0.9.0-1jpp.3.el4 |
redhat/java | <1.6.0-openjdk-1:1.6.0.0-1.16.b17.el5 | 1.6.0-openjdk-1:1.6.0.0-1.16.b17.el5 |
redhat/java | <1.6.0-openjdk-1:1.6.0.0-1.31.b17.el6_0 | 1.6.0-openjdk-1:1.6.0.0-1.31.b17.el6_0 |
redhat/java | <1.5.0-ibm-1:1.5.0.12.2-1jpp.1.el6 | 1.5.0-ibm-1:1.5.0.12.2-1jpp.1.el6 |
redhat/java | <1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el6 | 1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el6 |
redhat/java | <1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5 | 1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5 |
redhat/java | <1.6.0-sun-1:1.6.0.22-1jpp.1.el5 | 1.6.0-sun-1:1.6.0.22-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-1:1.5.0.12.2-1jpp.1.el5 | 1.5.0-ibm-1:1.5.0.12.2-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-1:1.6.0.9.0-1jpp.3.el5 | 1.6.0-ibm-1:1.6.0.9.0-1jpp.3.el5 |
Sun JRE | =1.6.0-update_3 | |
Sun JRE | =1.6.0-update_5 | |
Sun JRE | =1.6.0-update_13 | |
Sun JRE | =1.6.0-update_1 | |
Sun JRE | =1.6.0-update_2 | |
Sun JRE | =1.6.0-update_16 | |
Sun JRE | =1.6.0-update_20 | |
Sun JRE | =1.6.0-update_15 | |
Sun JRE | =1.6.0-update_6 | |
Sun JRE | <=1.6.0 | |
Sun JRE | =1.6.0-update_19 | |
Sun JRE | =1.6.0 | |
Sun JRE | =1.6.0-update_18 | |
Sun JRE | =1.6.0-update_10 | |
Sun JRE | =1.6.0-update_17 | |
Sun JRE | =1.6.0-update_7 | |
Sun JRE | =1.6.0-update_14 | |
Sun JRE | =1.6.0-update_4 | |
Sun JRE | =1.6.0-update_12 | |
Sun JRE | =1.6.0-update_11 | |
OpenJDK | =1.6.0-update_4 | |
OpenJDK | =1.6.0-update_7 | |
OpenJDK | =1.6.0-update_19 | |
OpenJDK | =1.6.0-update_13 | |
OpenJDK | =1.6.0-update_3 | |
OpenJDK | =1.6.0-update_11 | |
OpenJDK | =1.6.0-update_10 | |
OpenJDK | <=1.6.0 | |
OpenJDK | =1.6.0-update_14 | |
OpenJDK | =1.6.0 | |
OpenJDK | =1.6.0-update_17 | |
OpenJDK | =1.6.0-update_5 | |
OpenJDK | =1.6.0-update2 | |
OpenJDK | =1.6.0-update1_b06 | |
OpenJDK | =1.6.0-update_16 | |
OpenJDK | =1.6.0-update1 | |
OpenJDK | =1.6.0-update_15 | |
OpenJDK | =1.6.0-update_12 | |
OpenJDK | =1.6.0-update_18 | |
OpenJDK | =1.6.0-update_6 | |
OpenJDK | =1.6.0-update_20 | |
OpenJDK | =1.5.0-update20 | |
OpenJDK | =1.5.0-update15 | |
OpenJDK | =1.5.0-update18 | |
OpenJDK | =1.5.0-update3 | |
OpenJDK | =1.5.0-update21 | |
OpenJDK | =1.5.0-update11 | |
OpenJDK | =1.5.0-update16 | |
OpenJDK | =1.5.0-update17 | |
OpenJDK | =1.5.0-update9 | |
OpenJDK | =1.5.0-update22 | |
OpenJDK | <=1.5.0 | |
OpenJDK | =1.5.0-update6 | |
OpenJDK | =1.5.0-update14 | |
OpenJDK | =1.5.0-update23 | |
OpenJDK | =1.5.0-update1 | |
OpenJDK | =1.5.0-update4 | |
OpenJDK | =1.5.0-update7 | |
OpenJDK | =1.5.0 | |
OpenJDK | =1.5.0-update12 | |
OpenJDK | =1.5.0-update5 | |
OpenJDK | =1.5.0-update24 | |
OpenJDK | =1.5.0-update2 | |
OpenJDK | =1.5.0-update19 | |
OpenJDK | =1.5.0-update13 | |
OpenJDK | =1.5.0-update8 | |
OpenJDK | =1.5.0-update10 | |
Sun JRE | =1.5.0-update22 | |
Sun JRE | =1.5.0 | |
Sun JRE | =1.5.0-update18 | |
Sun JRE | =1.5.0-update2 | |
Sun JRE | =1.5.0-update13 | |
Sun JRE | =1.5.0-update24 | |
Sun JRE | =1.5.0-update12 | |
Sun JRE | =1.5.0-update8 | |
Sun JRE | =1.5.0-update16 | |
Sun JRE | =1.5.0-update21 | |
Sun JRE | =1.5.0-update11 | |
Sun JRE | =1.5.0-update15 | |
Sun JRE | =1.5.0-update7 | |
Sun JRE | =1.5.0-update3 | |
Sun JRE | =1.5.0-update20 | |
Sun JRE | =1.5.0-update5 | |
Sun JRE | =1.5.0-update14 | |
Sun JRE | =1.5.0-update6 | |
Sun JRE | =1.5.0-update9 | |
Sun JRE | =1.5.0-update1 | |
Sun JRE | =1.5.0-update19 | |
Sun JRE | =1.5.0-update10 | |
Sun JRE | <=1.5.0 | |
Sun JRE | =1.5.0-update4 | |
Sun JRE | =1.5.0-update23 | |
Sun JRE | =1.5.0-update17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2010-3573 is considered high due to potential impacts on confidentiality, integrity, and availability.
To fix CVE-2010-3573, users should update to the latest version of Java provided by their vendor.
CVE-2010-3573 affects Oracle Java SE and Java for Business version 6 Update 21 and 5.0 Update 25, among others.
Yes, CVE-2010-3573 can be exploited remotely by attackers through unpatched Java installations.
The potential impacts of CVE-2010-3573 include unauthorized access to sensitive data and disruption of services.