CVE-2017-10105

Priority
Description
Vulnerability in the Java SE component of Oracle Java SE (subcomponent:
Deployment). Supported versions that are affected are Java SE: 6u151, 7u141
and 8u131. Easily exploitable vulnerability allows unauthenticated attacker
with network access via multiple protocols to compromise Java SE.
Successful attacks require human interaction from a person other than the
attacker. Successful attacks of this vulnerability can result in
unauthorized update, insert or delete access to some of Java SE accessible
data. Note: This vulnerability applies to Java deployments, typically in
clients running sandboxed Java Web Start applications or sandboxed Java
applets, that load and run untrusted code (e.g., code that comes from the
internet) and rely on the Java sandbox for security. This vulnerability
does not apply to Java deployments, typically in servers, that load and run
only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base
Score 4.3 (Integrity impacts). CVSS Vector:
(CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
Notes
sbeattieaffects Deployment, not part of OpenJDK.
Package
Upstream:not-affected (Oracle Java only)
Ubuntu 14.04 ESM:DNE (trusty was not-affected [Oracle Java only])
Patches:
Package
Upstream:needs-triage
Ubuntu 14.04 ESM:DNE (trusty was not-affected [Oracle Java only])
Patches:
Package
Upstream:not-affected (Oracle Java only)
Ubuntu 16.04 ESM:not-affected (Oracle Java only)
Ubuntu 14.04 ESM:DNE
Patches:
More Information

Updated: 2022-04-13 12:51:52 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)