vendor:
Java
by:
Matthias Kaiser, egypt
N/A
CVSS
N/A
Java Runtime Environment
264
CWE
Product Name: Java
Affected Version From: 6
Affected Version To: 6 prior to update 22
Patch Exists: YES
Related CWE: CVE-2010-3563
CPE: a:oracle:java:6
Metasploit:
https://www.rapid7.com/db/vulnerabilities/hpux-cve-2010-3563/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2010-3563/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2010-3563/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0770/, https://www.rapid7.com/db/vulnerabilities/jre-vuln-cve-2010-3563/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-0880/, https://www.rapid7.com/db/vulnerabilities/vmsa-2011-0013-cve-2010-3563/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0987/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0095/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0004-2-vma-and-service-console-package-ntp-cve-2009-3563/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0009-1-esxi-userworld-update-cve-2009-3563/
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=51751, https://www.infosecmatter.com/nessus-plugin-library/?id=75540, https://www.infosecmatter.com/nessus-plugin-library/?id=60869, https://www.infosecmatter.com/nessus-plugin-library/?id=63983, https://www.infosecmatter.com/nessus-plugin-library/?id=51197, https://www.infosecmatter.com/nessus-plugin-library/?id=50919, https://www.infosecmatter.com/nessus-plugin-library/?id=51750, https://www.infosecmatter.com/nessus-plugin-library/?id=64843, https://www.infosecmatter.com/nessus-plugin-library/?id=56665, https://www.infosecmatter.com/nessus-plugin-library/?id=89681
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Java
2010
Sun Java Web Start BasicServiceImpl Remote Code Execution Exploit
This module exploits a vulnerability in Java Runtime Environment that allows an attacker to escape the Java Sandbox. By injecting a parameter into a javaws call within the BasicServiceImpl class the default java sandbox policy file can be therefore overwritten. The vulnerability affects version 6 prior to update 22.
Mitigation:
Update Java Runtime Environment to version 6 update 22 or later