ID CVE-2017-3533
Summary Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:jdk:1.6.0:update_141:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_141:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update_131:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update_131:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.8.0:update_121:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.8.0:update_121:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_141:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_141:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:icedtea:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:icedtea:1.5.2:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
redhat via4
advisories
  • rhsa
    id RHSA-2017:1108
  • rhsa
    id RHSA-2017:1109
  • rhsa
    id RHSA-2017:1117
  • rhsa
    id RHSA-2017:1118
  • rhsa
    id RHSA-2017:1119
  • rhsa
    id RHSA-2017:1204
  • rhsa
    id RHSA-2017:1220
  • rhsa
    id RHSA-2017:1221
  • rhsa
    id RHSA-2017:1222
  • rhsa
    id RHSA-2017:3453
rpms
  • java-1.8.0-openjdk-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-accessibility-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-accessibility-debug-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-debug-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-demo-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-demo-debug-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-devel-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-devel-debug-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-headless-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-headless-debug-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-javadoc-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-javadoc-debug-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-javadoc-zip-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-src-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-src-debug-1:1.8.0.131-2.b11.el7_3
  • java-1.8.0-openjdk-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-debug-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-demo-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-demo-debug-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-devel-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-devel-debug-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-headless-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-headless-debug-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-javadoc-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-javadoc-debug-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-src-1:1.8.0.131-0.b11.el6_9
  • java-1.8.0-openjdk-src-debug-1:1.8.0.131-0.b11.el6_9
  • java-1.7.0-openjdk-1:1.7.0.141-2.6.10.1.el7_3
  • java-1.7.0-openjdk-accessibility-1:1.7.0.141-2.6.10.1.el7_3
  • java-1.7.0-openjdk-demo-1:1.7.0.141-2.6.10.1.el7_3
  • java-1.7.0-openjdk-devel-1:1.7.0.141-2.6.10.1.el7_3
  • java-1.7.0-openjdk-headless-1:1.7.0.141-2.6.10.1.el7_3
  • java-1.7.0-openjdk-javadoc-1:1.7.0.141-2.6.10.1.el7_3
  • java-1.7.0-openjdk-src-1:1.7.0.141-2.6.10.1.el7_3
  • java-1.7.0-openjdk-1:1.7.0.141-2.6.10.1.el6_9
  • java-1.7.0-openjdk-demo-1:1.7.0.141-2.6.10.1.el6_9
  • java-1.7.0-openjdk-devel-1:1.7.0.141-2.6.10.1.el6_9
  • java-1.7.0-openjdk-javadoc-1:1.7.0.141-2.6.10.1.el6_9
  • java-1.7.0-openjdk-src-1:1.7.0.141-2.6.10.1.el6_9
refmap via4
bid 97740
confirm http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
debian DSA-3858
gentoo
  • GLSA-201705-03
  • GLSA-201707-01
sectrack 1038286
Last major update 03-10-2019 - 00:03
Published 24-04-2017 - 19:59
Back to Top