CVE-2010-3574 Detail

Current Description

Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.


View Analysis Description

Severity



CVSS 3.x Severity and Metrics:

NIST CVSS score
NIST: NVD
Base Score:  N/A
NVD score not yet provided.


NVD Analysts use publicly available information to associate vector strings and CVSS scores. We also display any CVSS information provided within the CVE List from the CNA.

Note: NVD Analysts have not published a CVSS score for this CVE at this time. NVD Analysts use publicly available information at the time of analysis to associate CVSS vector strings.

Evaluator Impact

Per: http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html 'Oracle released a Java Critical Patch Update in October 2010 to address multiple vulnerabilities affecting the Java Runtime Environment. Oracle CVE-2010-3574 refers to the advisories that were applicable to JRockit from the Java Critical Patch Update. The CVSS score of this vulnerability CVE# reflects the highest among those fixed in JRockit. The complete list of all advisories addressed in JRockit under CVE-2010-3574 is as follows: CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3551 CVE-2010-3553, CVE-2010-3554, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557, CVE-2010-3559, CVE-2010-3561, CVE-2010-3562, CVE-2010-3565, CVE-2010-3566, CVE-2010-3567, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572, CVE-2010-3573 and CVE-2010-3574.'

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.avaya.com/css/P8/documents/100114315
http://support.avaya.com/css/P8/documents/100114327
http://support.avaya.com/css/P8/documents/100123193
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html Patch  Vendor Advisory 
http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html Patch  Vendor Advisory 
http://www.redhat.com/support/errata/RHSA-2010-0768.html Vendor Advisory 
http://www.redhat.com/support/errata/RHSA-2010-0770.html Vendor Advisory 
http://www.redhat.com/support/errata/RHSA-2010-0807.html Vendor Advisory 
http://www.redhat.com/support/errata/RHSA-2010-0865.html Vendor Advisory 
http://www.redhat.com/support/errata/RHSA-2010-0873.html Vendor Advisory 
http://www.redhat.com/support/errata/RHSA-2010-0935.html Vendor Advisory 
http://www.redhat.com/support/errata/RHSA-2010-0987.html Vendor Advisory 
http://www.redhat.com/support/errata/RHSA-2011-0152.html Vendor Advisory 
http://www.redhat.com/support/errata/RHSA-2011-0880.html Vendor Advisory 
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.securityfocus.com/bid/44011
http://www.ubuntu.com/usn/USN-1010-1
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vupen.com/english/advisories/2010/3086 Vendor Advisory 
http://www.vupen.com/english/advisories/2010/3112 Vendor Advisory 
http://www.vupen.com/english/advisories/2011/0134 Vendor Advisory 
http://www.vupen.com/english/advisories/2011/0143 Vendor Advisory 
https://bugzilla.redhat.com/show_bug.cgi?id=642215
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12367
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12462

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-noinfo Insufficient Information cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

14 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2010-3574
NVD Published Date:
10/19/2010
NVD Last Modified:
10/30/2018
Source:
MITRE