First published: Thu Dec 16 2010(Updated: )
The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat IcedTea | =1.7 | |
Red Hat IcedTea | =1.7.1 | |
Red Hat IcedTea | =1.7.2 | |
Red Hat IcedTea | =1.7.3 | |
Red Hat IcedTea | =1.7.4 | |
Red Hat IcedTea | =1.7.5 | |
Red Hat IcedTea | =1.7.6 | |
Red Hat IcedTea | =1.8 | |
Red Hat IcedTea | =1.8.1 | |
Red Hat IcedTea | =1.8.2 | |
Red Hat IcedTea | =1.8.3 | |
Red Hat IcedTea | =1.9 | |
Red Hat IcedTea | =1.9.1 | |
Red Hat IcedTea | =1.9.2 | |
Red Hat IcedTea | =1.9.3 | |
sun OpenJDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4351 is classified as a moderate severity vulnerability that may allow attackers to bypass security checks.
To mitigate CVE-2010-4351, upgrade to IcedTea version 1.7.7, 1.8.4, 1.9.4 or later.
CVE-2010-4351 affects multiple versions of Red Hat IcedTea including 1.7 through 1.9.3.
CVE-2010-4351 may allow context-dependent attackers to bypass security restrictions.
Yes, CVE-2010-4351 is a recognized flaw documented in the Common Vulnerabilities and Exposures database.