cnvd-2017-32262
Vulnerability from cnvd

Title: Java SE和Jrockit拒绝服务漏洞

Description:

Java SE是Java平台标准版的简称,用于开发和部署桌面、服务器以及嵌入设备和实时环境中的Java应用程序。JRockit系列产品是一个全面的Java运行时解决方案组合,包括了行业最快的标准Java解决方案。

Java SE和Jrockit中的Serialization组件存在安全漏洞,攻击者可利用该漏洞影响系统的可用性。

Severity:

Patch Name: Java SE和Jrockit拒绝服务漏洞的补丁

Patch Description:

Java SE是Java平台标准版的简称,用于开发和部署桌面、服务器以及嵌入设备和实时环境中的Java应用程序。JRockit系列产品是一个全面的Java运行时解决方案组合,包括了行业最快的标准Java解决方案。

Java SE和Jrockit中的Serialization组件存在安全漏洞,攻击者可利用该漏洞影响系统的可用性。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

厂商已发布漏洞修复程序,请及时关注更新: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Reference: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Impacted products
Name
['Oracle Java JDK 1.6.0', 'Oracle Java JDK 1.7.0', 'Oracle Java JDK 1.8.0', 'Oracle Java JDK 1.9.0', 'Oracle Java JRE 1.6.0', 'Oracle Java JRE 1.7.0', 'Oracle Java JRE 1.8.0', 'Oracle Java JRE 1.9.0']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "101382"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-10347"
    }
  },
  "description": "Java SE\u662fJava\u5e73\u53f0\u6807\u51c6\u7248\u7684\u7b80\u79f0,\u7528\u4e8e\u5f00\u53d1\u548c\u90e8\u7f72\u684c\u9762\u3001\u670d\u52a1\u5668\u4ee5\u53ca\u5d4c\u5165\u8bbe\u5907\u548c\u5b9e\u65f6\u73af\u5883\u4e2d\u7684Java\u5e94\u7528\u7a0b\u5e8f\u3002JRockit\u7cfb\u5217\u4ea7\u54c1\u662f\u4e00\u4e2a\u5168\u9762\u7684Java\u8fd0\u884c\u65f6\u89e3\u51b3\u65b9\u6848\u7ec4\u5408\uff0c\u5305\u62ec\u4e86\u884c\u4e1a\u6700\u5feb\u7684\u6807\u51c6Java\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nJava SE\u548cJrockit\u4e2d\u7684Serialization\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5f71\u54cd\u7cfb\u7edf\u7684\u53ef\u7528\u6027\u3002",
  "discovererName": "Gaston Traberg of Onapsis",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-32262",
  "openTime": "2017-11-01",
  "patchDescription": "Java SE\u662fJava\u5e73\u53f0\u6807\u51c6\u7248\u7684\u7b80\u79f0,\u7528\u4e8e\u5f00\u53d1\u548c\u90e8\u7f72\u684c\u9762\u3001\u670d\u52a1\u5668\u4ee5\u53ca\u5d4c\u5165\u8bbe\u5907\u548c\u5b9e\u65f6\u73af\u5883\u4e2d\u7684Java\u5e94\u7528\u7a0b\u5e8f\u3002JRockit\u7cfb\u5217\u4ea7\u54c1\u662f\u4e00\u4e2a\u5168\u9762\u7684Java\u8fd0\u884c\u65f6\u89e3\u51b3\u65b9\u6848\u7ec4\u5408\uff0c\u5305\u62ec\u4e86\u884c\u4e1a\u6700\u5feb\u7684\u6807\u51c6Java\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nJava SE\u548cJrockit\u4e2d\u7684Serialization\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5f71\u54cd\u7cfb\u7edf\u7684\u53ef\u7528\u6027\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Java SE\u548cJrockit\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Oracle Java JDK 1.6.0",
      "Oracle Java JDK 1.7.0",
      "Oracle Java JDK 1.8.0",
      "Oracle Java JDK 1.9.0",
      "Oracle Java JRE 1.6.0",
      "Oracle Java JRE 1.7.0",
      "Oracle Java JRE 1.8.0",
      "Oracle Java JRE 1.9.0"
    ]
  },
  "referenceLink": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
  "serverity": "\u4e2d",
  "submitTime": "2017-10-18",
  "title": "Java SE\u548cJrockit\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…