ID CVE-2018-2657
Summary Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u171 and 7u161; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:jrockit:r28.3.16:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jrockit:r28.3.16:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update171:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update171:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update171:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update171:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*
  • cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:xp7_command_view:8.6.2-01:*:*:*:advanced:*:*:*
    cpe:2.3:a:hp:xp7_command_view:8.6.2-01:*:*:*:advanced:*:*:*
  • cpe:2.3:a:hp:xp_p9000_command_view:8.6.2-01:*:*:*:advanced:*:*:*
    cpe:2.3:a:hp:xp_p9000_command_view:8.6.2-01:*:*:*:advanced:*:*:*
  • cpe:2.3:a:hp:xp_command_view:8.6.2-01:*:*:*:advanced:*:*:*
    cpe:2.3:a:hp:xp_command_view:8.6.2-01:*:*:*:advanced:*:*:*
CVSS
Base: 5.0 (as of 13-05-2022 - 14:57)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
  • rhsa
    id RHSA-2018:0100
  • rhsa
    id RHSA-2018:0115
  • rhsa
    id RHSA-2018:0458
  • rhsa
    id RHSA-2018:0521
  • rhsa
    id RHSA-2018:1463
  • rhsa
    id RHSA-2018:1812
rpms
  • java-1.7.0-oracle-1:1.7.0.171-1jpp.1.el6_9
  • java-1.7.0-oracle-1:1.7.0.171-1jpp.1.el7
  • java-1.7.0-oracle-devel-1:1.7.0.171-1jpp.1.el6_9
  • java-1.7.0-oracle-devel-1:1.7.0.171-1jpp.1.el7
  • java-1.7.0-oracle-javafx-1:1.7.0.171-1jpp.1.el6_9
  • java-1.7.0-oracle-javafx-1:1.7.0.171-1jpp.1.el7
  • java-1.7.0-oracle-jdbc-1:1.7.0.171-1jpp.1.el6_9
  • java-1.7.0-oracle-jdbc-1:1.7.0.171-1jpp.1.el7
  • java-1.7.0-oracle-plugin-1:1.7.0.171-1jpp.1.el6_9
  • java-1.7.0-oracle-plugin-1:1.7.0.171-1jpp.1.el7
  • java-1.7.0-oracle-src-1:1.7.0.171-1jpp.1.el6_9
  • java-1.7.0-oracle-src-1:1.7.0.171-1jpp.1.el7
  • java-1.6.0-sun-1:1.6.0.181-1jpp.1.el6
  • java-1.6.0-sun-1:1.6.0.181-1jpp.2.el7
  • java-1.6.0-sun-demo-1:1.6.0.181-1jpp.1.el6
  • java-1.6.0-sun-demo-1:1.6.0.181-1jpp.2.el7
  • java-1.6.0-sun-devel-1:1.6.0.181-1jpp.1.el6
  • java-1.6.0-sun-devel-1:1.6.0.181-1jpp.2.el7
  • java-1.6.0-sun-jdbc-1:1.6.0.181-1jpp.1.el6
  • java-1.6.0-sun-jdbc-1:1.6.0.181-1jpp.2.el7
  • java-1.6.0-sun-plugin-1:1.6.0.181-1jpp.1.el6
  • java-1.6.0-sun-plugin-1:1.6.0.181-1jpp.2.el7
  • java-1.6.0-sun-src-1:1.6.0.181-1jpp.1.el6
  • java-1.6.0-sun-src-1:1.6.0.181-1jpp.2.el7
  • java-1.7.1-ibm-1:1.7.1.4.20-1jpp.1.el7
  • java-1.7.1-ibm-demo-1:1.7.1.4.20-1jpp.1.el7
  • java-1.7.1-ibm-devel-1:1.7.1.4.20-1jpp.1.el7
  • java-1.7.1-ibm-jdbc-1:1.7.1.4.20-1jpp.1.el7
  • java-1.7.1-ibm-plugin-1:1.7.1.4.20-1jpp.1.el7
  • java-1.7.1-ibm-src-1:1.7.1.4.20-1jpp.1.el7
  • java-1.7.1-ibm-1:1.7.1.4.20-1jpp.3.el6_9
  • java-1.7.1-ibm-demo-1:1.7.1.4.20-1jpp.3.el6_9
  • java-1.7.1-ibm-devel-1:1.7.1.4.20-1jpp.3.el6_9
  • java-1.7.1-ibm-jdbc-1:1.7.1.4.20-1jpp.3.el6_9
  • java-1.7.1-ibm-plugin-1:1.7.1.4.20-1jpp.3.el6_9
  • java-1.7.1-ibm-src-1:1.7.1.4.20-1jpp.3.el6_9
  • java-1.8.0-ibm-1:1.8.0.5.10-1jpp.1.el6_9
  • java-1.8.0-ibm-devel-1:1.8.0.5.10-1jpp.1.el6_9
  • java-1.7.1-ibm-1:1.7.1.4.20-1jpp.3.el6_9
  • java-1.7.1-ibm-devel-1:1.7.1.4.20-1jpp.3.el6_9
refmap via4
bid 102629
confirm
sectrack 1040203
Last major update 13-05-2022 - 14:57
Published 18-01-2018 - 02:29
Last modified 13-05-2022 - 14:57
Back to Top