Rapid7 VulnDB

SUSE Linux Security Vulnerability: CVE-2010-4471

Back to Search

SUSE Linux Security Vulnerability: CVE-2010-4471

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
02/17/2011
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to 2D. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the exposure of system properties via vectors related to Font.createFont and exception text.

Solution(s)

  • suse-upgrade-ibmjava5-jre
  • suse-upgrade-ibmjava5-sdk
  • suse-upgrade-java-1_5_0-ibm
  • suse-upgrade-java-1_5_0-ibm-32bit
  • suse-upgrade-java-1_5_0-ibm-64bit
  • suse-upgrade-java-1_5_0-ibm-alsa
  • suse-upgrade-java-1_5_0-ibm-alsa-32bit
  • suse-upgrade-java-1_5_0-ibm-demo
  • suse-upgrade-java-1_5_0-ibm-devel
  • suse-upgrade-java-1_5_0-ibm-devel-32bit
  • suse-upgrade-java-1_5_0-ibm-fonts
  • suse-upgrade-java-1_5_0-ibm-jdbc
  • suse-upgrade-java-1_5_0-ibm-plugin
  • suse-upgrade-java-1_5_0-ibm-src
  • suse-upgrade-java-1_6_0-ibm
  • suse-upgrade-java-1_6_0-ibm-32bit
  • suse-upgrade-java-1_6_0-ibm-64bit
  • suse-upgrade-java-1_6_0-ibm-alsa
  • suse-upgrade-java-1_6_0-ibm-alsa-32bit
  • suse-upgrade-java-1_6_0-ibm-devel
  • suse-upgrade-java-1_6_0-ibm-devel-32bit
  • suse-upgrade-java-1_6_0-ibm-fonts
  • suse-upgrade-java-1_6_0-ibm-jdbc
  • suse-upgrade-java-1_6_0-ibm-plugin
  • suse-upgrade-java-1_6_0-ibm-plugin-32bit
  • suse-upgrade-java-1_6_0-openjdk
  • suse-upgrade-java-1_6_0-openjdk-demo
  • suse-upgrade-java-1_6_0-openjdk-devel
  • suse-upgrade-java-1_6_0-openjdk-javadoc
  • suse-upgrade-java-1_6_0-openjdk-plugin
  • suse-upgrade-java-1_6_0-openjdk-src
  • suse-upgrade-java-1_6_0-sun
  • suse-upgrade-java-1_6_0-sun-32bit
  • suse-upgrade-java-1_6_0-sun-alsa
  • suse-upgrade-java-1_6_0-sun-demo
  • suse-upgrade-java-1_6_0-sun-devel
  • suse-upgrade-java-1_6_0-sun-jdbc
  • suse-upgrade-java-1_6_0-sun-plugin
  • suse-upgrade-java-1_6_0-sun-plugin-32bit
  • suse-upgrade-java-1_6_0-sun-src
  • suse-upgrade-sap-aio-release

References

  • suse-upgrade-ibmjava5-jre
  • suse-upgrade-ibmjava5-sdk
  • suse-upgrade-java-1_5_0-ibm
  • suse-upgrade-java-1_5_0-ibm-32bit
  • suse-upgrade-java-1_5_0-ibm-64bit
  • suse-upgrade-java-1_5_0-ibm-alsa
  • suse-upgrade-java-1_5_0-ibm-alsa-32bit
  • suse-upgrade-java-1_5_0-ibm-demo
  • suse-upgrade-java-1_5_0-ibm-devel
  • suse-upgrade-java-1_5_0-ibm-devel-32bit
  • suse-upgrade-java-1_5_0-ibm-fonts
  • suse-upgrade-java-1_5_0-ibm-jdbc
  • suse-upgrade-java-1_5_0-ibm-plugin
  • suse-upgrade-java-1_5_0-ibm-src
  • suse-upgrade-java-1_6_0-ibm
  • suse-upgrade-java-1_6_0-ibm-32bit
  • suse-upgrade-java-1_6_0-ibm-64bit
  • suse-upgrade-java-1_6_0-ibm-alsa
  • suse-upgrade-java-1_6_0-ibm-alsa-32bit
  • suse-upgrade-java-1_6_0-ibm-devel
  • suse-upgrade-java-1_6_0-ibm-devel-32bit
  • suse-upgrade-java-1_6_0-ibm-fonts
  • suse-upgrade-java-1_6_0-ibm-jdbc
  • suse-upgrade-java-1_6_0-ibm-plugin
  • suse-upgrade-java-1_6_0-ibm-plugin-32bit
  • suse-upgrade-java-1_6_0-openjdk
  • suse-upgrade-java-1_6_0-openjdk-demo
  • suse-upgrade-java-1_6_0-openjdk-devel
  • suse-upgrade-java-1_6_0-openjdk-javadoc
  • suse-upgrade-java-1_6_0-openjdk-plugin
  • suse-upgrade-java-1_6_0-openjdk-src
  • suse-upgrade-java-1_6_0-sun
  • suse-upgrade-java-1_6_0-sun-32bit
  • suse-upgrade-java-1_6_0-sun-alsa
  • suse-upgrade-java-1_6_0-sun-demo
  • suse-upgrade-java-1_6_0-sun-devel
  • suse-upgrade-java-1_6_0-sun-jdbc
  • suse-upgrade-java-1_6_0-sun-plugin
  • suse-upgrade-java-1_6_0-sun-plugin-32bit
  • suse-upgrade-java-1_6_0-sun-src
  • suse-upgrade-sap-aio-release

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;