CVE-2010-3569

Published: 19 October 2010

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.

From the Ubuntu security team

It was discovered that the defaultReadObject of the Serialization API could be tricked into setting a volatile field multiple times. This could allow an attacker to execute arbitrary code with the privileges of the user running a java applet or application.

Priority

Low

Status

Package Release Status
openjdk-6
Launchpad, Ubuntu, Debian
Upstream Needs triage

openjdk-6b18
Launchpad, Ubuntu, Debian
Upstream
Released (6b22)
sun-java6
Launchpad, Ubuntu, Debian
Upstream Needs triage

Notes

AuthorNote
sbeattie
red hat description: defaultReadObject of the Serialization
API could be tricked into setting a volatile field multiple times,
which could allow a remote attacker to execute arbitrary code with
the privileges of the user running the applet or application.

References