CVE-2010-0843

N/A Unknown
Published: April 01, 2010 Modified: April 29, 2026
View on NVD

Description

Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to XNewPtr and improper handling of an integer parameter when allocating heap memory in the com.sun.media.sound libraries, which allows remote attackers to execute arbitrary code.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/63492
Source: secalert_us@oracle.com
http://seclists.org/bugtraq/2010/Apr/41
Source: secalert_us@oracle.com
http://secunia.com/advisories/39317
Source: secalert_us@oracle.com
Vendor Advisory
http://secunia.com/advisories/39659
Source: secalert_us@oracle.com
Vendor Advisory
http://secunia.com/advisories/39819
Source: secalert_us@oracle.com
Vendor Advisory
http://secunia.com/advisories/40211
Source: secalert_us@oracle.com
Vendor Advisory
http://secunia.com/advisories/40545
Source: secalert_us@oracle.com
Vendor Advisory
http://secunia.com/advisories/43308
Source: secalert_us@oracle.com
Vendor Advisory
http://support.apple.com/kb/HT4170
Source: secalert_us@oracle.com
http://support.apple.com/kb/HT4171
Source: secalert_us@oracle.com
http://www.securityfocus.com/bid/39083
Source: secalert_us@oracle.com
http://www.vupen.com/english/advisories/2010/1191
Source: secalert_us@oracle.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1454
Source: secalert_us@oracle.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1523
Source: secalert_us@oracle.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793
Source: secalert_us@oracle.com
Vendor Advisory
http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=134254866602253&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/63492
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/bugtraq/2010/Apr/41
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/39317
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/39659
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/39819
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/40211
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/40545
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/43308
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://support.apple.com/kb/HT4170
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT4171
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2010-0337.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2010-0338.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2010-0383.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2010-0471.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2010-0489.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/516397/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/39083
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/1191
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1454
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1523
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-10-052/
Source: af854a3a-2127-422b-91ae-364da2661108

68 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
10.0%
93th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

sun