ID CVE-2017-1376
Summary A flaw in the IBM J9 VM class verifier allows untrusted code to disable the security manager and elevate its privileges. IBM X-Force ID: 126873.
References
Vulnerable Configurations
  • cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:operations_analytics_predictive_insights:1.3.6:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE CWE-829
CAPEC
  • Force Use of Corrupted Files
    This describes an attack where an application is forced to use a file that an attacker has corrupted. The result is often a denial of service caused by the application being unable to process the corrupted file, but other results, including the disabling of filters or access controls (if the application fails in an unsafe way rather than failing by locking down) or buffer overflows are possible.
  • Code Inclusion
    An adversary exploits a weakness on the target to force arbitrary code to be retrieved locally or from a remote location and executed. This differs from code injection in that code injection involves the direct inclusion of code while code inclusion involves the addition or replacement of a reference to a code file, which is subsequently loaded by the target and used as part of the code of some application.
  • DTD Injection
    An attacker injects malicious content into an application's DTD in an attempt to produce a negative technical impact. DTDs are used to describe how XML documents are processed. Certain malformed DTDs (for example, those with excessive entity expansion as described in CAPEC 197) can cause the XML parsers that process the DTDs to consume excessive resources resulting in resource depletion.
  • PHP Local File Inclusion
    The attacker loads and executes an arbitrary local PHP file on a target machine. The attacker could use this to try to load old versions of PHP files that have known vulnerabilities, to load PHP files that the attacker placed on the local machine during a prior attack, or to otherwise change the functionality of the targeted application in unexpected ways.
  • Local Code Inclusion
    The attacker forces an application to load arbitrary code files from the local machine. The attacker could use this to try to load old versions of library files that have known vulnerabilities, to load files that the attacker placed on the local machine during a prior attack, or to otherwise change the functionality of the targeted application in unexpected ways.
  • Local Execution of Code
    An adversary installs and executes malicious code on the target system in an effort to achieve a negative technical impact. Examples include rootkits, ransomware, spyware, adware, and others.
  • Remote Code Inclusion
    The attacker forces an application to load arbitrary code files from a remote location. The attacker could use this to try to load old versions of library files that have known vulnerabilities, to load malicious files that the attacker placed on the remote machine, or to otherwise change the functionality of the targeted application in unexpected ways.
  • XML Entity Linking
    An attacker creates an XML document that contains an external entity reference. External entity references can take the form of <!ENTITY name system "uri"> tags in a DTD. Because processors may not validate documents with external entities, there may be no checks on the nature of the reference in the external entity. This can allow an attacker to open arbitrary files or connections.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
redhat via4
advisories
  • rhsa
    id RHSA-2017:2469
  • rhsa
    id RHSA-2017:2481
rpms
  • java-1.8.0-ibm-1:1.8.0.4.10-1jpp.1.el6_9
  • java-1.8.0-ibm-1:1.8.0.4.10-1jpp.3.el7
  • java-1.8.0-ibm-demo-1:1.8.0.4.10-1jpp.1.el6_9
  • java-1.8.0-ibm-demo-1:1.8.0.4.10-1jpp.3.el7
  • java-1.8.0-ibm-devel-1:1.8.0.4.10-1jpp.1.el6_9
  • java-1.8.0-ibm-devel-1:1.8.0.4.10-1jpp.3.el7
  • java-1.8.0-ibm-jdbc-1:1.8.0.4.10-1jpp.1.el6_9
  • java-1.8.0-ibm-jdbc-1:1.8.0.4.10-1jpp.3.el7
  • java-1.8.0-ibm-plugin-1:1.8.0.4.10-1jpp.1.el6_9
  • java-1.8.0-ibm-plugin-1:1.8.0.4.10-1jpp.3.el7
  • java-1.8.0-ibm-src-1:1.8.0.4.10-1jpp.1.el6_9
  • java-1.8.0-ibm-src-1:1.8.0.4.10-1jpp.3.el7
  • java-1.7.1-ibm-1:1.7.1.4.10-1jpp.2.el6_9
  • java-1.7.1-ibm-1:1.7.1.4.10-1jpp.3.el7
  • java-1.7.1-ibm-demo-1:1.7.1.4.10-1jpp.2.el6_9
  • java-1.7.1-ibm-demo-1:1.7.1.4.10-1jpp.3.el7
  • java-1.7.1-ibm-devel-1:1.7.1.4.10-1jpp.2.el6_9
  • java-1.7.1-ibm-devel-1:1.7.1.4.10-1jpp.3.el7
  • java-1.7.1-ibm-jdbc-1:1.7.1.4.10-1jpp.2.el6_9
  • java-1.7.1-ibm-jdbc-1:1.7.1.4.10-1jpp.3.el7
  • java-1.7.1-ibm-plugin-1:1.7.1.4.10-1jpp.2.el6_9
  • java-1.7.1-ibm-plugin-1:1.7.1.4.10-1jpp.3.el7
  • java-1.7.1-ibm-src-1:1.7.1.4.10-1jpp.2.el6_9
  • java-1.7.1-ibm-src-1:1.7.1.4.10-1jpp.3.el7
refmap via4
confirm http://www.ibm.com/support/docview.wss?uid=swg22007305&myns=swgtiv&mynp=OCSSJQQ3&mync=E&cm_sp=swgtiv-_-OCSSJQQ3-_-E
misc https://exchange.xforce.ibmcloud.com/vulnerabilities/126873
Last major update 03-10-2019 - 00:03
Published 29-08-2017 - 01:35
Last modified 03-10-2019 - 00:03
Back to Top