vendor:
Java Runtime Environment
by:
Unknown
9
CVSS
CRITICAL
Stack Overflow
119
CWE
Product Name: Java Runtime Environment
Affected Version From: Java runtime < 6.19
Affected Version To:
Patch Exists: NO
Related CWE: CVE-2010-0838
CPE: a:sun:java_runtime_environment
Metasploit:
https://www.rapid7.com/db/vulnerabilities/vmsa-2011-0003-cve-2010-0838/, https://www.rapid7.com/db/vulnerabilities/hpsim-cve-2010-0838/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0337/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0338/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0339/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0471/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2010-0838/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2010-0838/, https://www.rapid7.com/db/vulnerabilities/jre-java-2d-unspecified-cve-2010-0838/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2010-0838/, https://www.rapid7.com/db/vulnerabilities/apple-java-cve-2010-0838/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0383/
Platforms Tested:
2010
Java CMM readMabCurveData stack overflow
This exploit allows an attacker to execute arbitrary code by exploiting a stack overflow vulnerability in the Java CMM component. The vulnerability exists in Java runtime versions prior to 6.19. By sending a specially crafted request, an attacker can trigger the stack overflow and gain control of the affected system.
Mitigation:
To mitigate this vulnerability, it is recommended to update the Java runtime to version 6.19 or later. Additionally, users should exercise caution when running untrusted Java applets or opening maliciously crafted files.