CVE-2017-10105

Priority
Description
Vulnerability in the Java SE component of Oracle Java SE (subcomponent:
Deployment). Supported versions that are affected are Java SE: 6u151, 7u141
and 8u131. Easily exploitable vulnerability allows unauthenticated attacker
with network access via multiple protocols to compromise Java SE.
Successful attacks require human interaction from a person other than the
attacker. Successful attacks of this vulnerability can result in
unauthorized update, insert or delete access to some of Java SE accessible
data. Note: This vulnerability applies to Java deployments, typically in
clients running sandboxed Java Web Start applications or sandboxed Java
applets, that load and run untrusted code (e.g., code that comes from the
internet) and rely on the Java sandbox for security. This vulnerability
does not apply to Java deployments, typically in servers, that load and run
only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base
Score 4.3 (Integrity impacts). CVSS Vector:
(CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
Notes
sbeattieaffects Deployment, not part of OpenJDK.
Package
Upstream:not-affected (Oracle Java only)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [Oracle Java only])
Ubuntu 22.04 LTS (Jammy Jellyfish):DNE
Patches:
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [Oracle Java only])
Ubuntu 22.04 LTS (Jammy Jellyfish):DNE
Patches:
Package
Upstream:not-affected (Oracle Java only)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.06 ESM (Xenial Xerus):not-affected (Oracle Java only)
Ubuntu 22.04 LTS (Jammy Jellyfish):not-affected (Oracle Java only)
Patches:
More Information

Updated: 2021-10-21 05:31:04 UTC (commit 1bbbce2fb1a3c15b20fcf10f0073e1fb6ad43ae6)