Rapid7 Vulnerability & Exploit Database

HP-UX: CVE-2010-4450: Running Java, Remote Execution of Arbitrary Code, Disclosure of Information, and Other Vulnerabilities

Back to Search

HP-UX: CVE-2010-4450: Running Java, Remote Execution of Arbitrary Code, Disclosure of Information, and Other Vulnerabilities

Severity
4
CVSS
(AV:L/AC:H/Au:N/C:P/I:P/A:P)
Published
02/17/2011
Created
07/25/2018
Added
08/11/2017
Modified
09/12/2017

Description

Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Solaris and Linux; 5.0 Update 27 and earlier for Solaris and Linux; and 1.4.2_29 and earlier for Solaris and Linux allows local standalone applications to affect confidentiality, integrity, and availability via unknown vectors related to Launcher. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is an untrusted search path vulnerability involving an empty LD_LIBRARY_PATH environment variable.

Solution(s)

  • hpux-update-jdk15-jdk15-com
  • hpux-update-jdk15-jdk15-ipf32
  • hpux-update-jdk15-jdk15-ipf64
  • hpux-update-jdk15-jdk15-pa20
  • hpux-update-jdk15-jdk15-pa20w
  • hpux-update-jdk60-jdk60-com
  • hpux-update-jdk60-jdk60-ipf32
  • hpux-update-jdk60-jdk60-ipf64
  • hpux-update-jdk60-jdk60-pa20
  • hpux-update-jdk60-jdk60-pa20w
  • hpux-update-jre15-jre15-com
  • hpux-update-jre15-jre15-ipf32
  • hpux-update-jre15-jre15-ipf32-hs
  • hpux-update-jre15-jre15-ipf64
  • hpux-update-jre15-jre15-ipf64-hs
  • hpux-update-jre15-jre15-pa20
  • hpux-update-jre15-jre15-pa20-hs
  • hpux-update-jre15-jre15-pa20w
  • hpux-update-jre15-jre15-pa20w-hs
  • hpux-update-jre60-jre60-com
  • hpux-update-jre60-jre60-ipf32
  • hpux-update-jre60-jre60-ipf32-hs
  • hpux-update-jre60-jre60-ipf64
  • hpux-update-jre60-jre60-ipf64-hs
  • hpux-update-jre60-jre60-pa20
  • hpux-update-jre60-jre60-pa20-hs
  • hpux-update-jre60-jre60-pa20w-hs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;