CVE-2010-4265
Published Dec 30, 2010
Last updated a year ago
Overview
- Description
- The org.jboss.remoting.transport.bisocket.BisocketServerInvoker$SecondaryServerSocketThread.run method in JBoss Remoting 2.2.x before 2.2.3.SP4 and 2.5.x before 2.5.3.SP2 in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 through 4.3.0.CP09 allows remote attackers to cause a denial of service (daemon outage) by establishing a bisocket control connection TCP session, and then not sending any application data, related to a missing CVE-2010-3862 patch. NOTE: this can be considered a duplicate of CVE-2010-3862 because a missing patch should not be assigned a separate CVE identifier.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.6
- Impact score
- 2.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73CE9D33-C47B-4781-98CF-39F47D5C6E7A" }, { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.2:sp10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47DAB8A9-8051-4F3A-BE0B-C25274569A39" }, { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.2:sp11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0366492-7A9C-4EFB-8376-0872255E0818" }, { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.2:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3EACF37-083A-4A13-BAD0-92ED94A412EF" }, { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.2:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA1C34A8-4B0C-4F2D-B0EF-BD5511CE679D" }, { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.2:sp7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7CBE5D3-BDDB-4C1D-B0A2-DDDF3C80D1B4" }, { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.2:sp8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C236E4B-9DCC-474D-90D0-2C61DE0C66E6" }, { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6135AFA9-415D-4438-AFD6-829F457EDA35" }, { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.3:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5991E822-E554-497A-9693-D0F3239ADC44" }, { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.3:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC3696E9-2702-41E4-9566-B55A6BEE9E9E" }, { "criteria": "cpe:2.3:a:redhat:jboss_remoting:2.2.3:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21819E6B-4EFF-4832-AF46-751E9B964A91" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E82B2AD8-967D-4ABE-982B-87B9DE73F8D6" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp01:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B3E4026-F98E-4AEB-9FE1-4FFBBF44AC55" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp02:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "960A513A-CAFC-4B3D-ABD7-4659CF545C73" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp03:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2D8DC6D-5E39-4A53-8BB8-F998706D573F" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp04:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AA2D64E-D7E7-400D-AC7E-CB2045750791" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp05:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "197F047B-E11C-4B79-B6C4-79B2C278A33F" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp06:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCE383FE-3C03-4B4F-A2E6-AD673F8A44FE" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp07:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62A85D7D-B60A-4566-BA4B-2F74E452C4EE" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp08:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08103F7B-E6BD-4688-B178-F4839B1CD434" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp09:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA7424BA-1E18-4267-9697-F4560BE75359" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "972C5C87-E982-44A5-866D-FDEACB5203B8" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC20F443-4918-46D2-8251-1C8F072B7733" } ], "operator": "OR" } ], "operator": "AND" } ]