Lucene search

K
kasperskyKaspersky LabKLA10958
HistoryJan 27, 2017 - 12:00 a.m.

KLA10958 Multiple vulnerabilities in Oracle Java SE

2017-01-2700:00:00
Kaspersky Lab
threats.kaspersky.com
67

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

7.6 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.1%

Multiple serious vulnerabilities have been found in Oracle Java SE components. Malicious users can exploit these vulnerabilities to gain privileges, cause a denial of service or obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An unspecified vulnerability in Libraries subcomponent can be exploited remotely by an unauthenticated attacker via multiple protocols to gain privileges and cause a partial denial of service as a result;
  2. An unspecified vulnerability in Libraries subcomponent can be exploited remotely by an unauthenticated attacker via multiple protocols to gain privileges and obtain sensitive information.

Technical details

Vulnerability (1) is related to Java SE, Java SE Embedded and JRockit components of Oracle Java SE.

Vulnerability (1) is applicable to both client and server deployment of Java.

Vulnerability (1) can be exploited via sandboxed Java applets and sandboxed Java Web Start applications. Other way to exploit given vulnerability is to supply data to APIs in the specified Component. In this case neither Java Web Start applications nor sandboxed Java applets are necessary – attack can be performed, for example, through a web service.

Vulnerability (2) is related to Java SE, Java SE Embedded components of Oracle Java SE.

Successful attack of vulnerability (2) requires user interaction (with not the same person as the unauthenticated attacker).

Vulnerability (2) is frequently applicable to Java deployments, where clients use sandboxed Java applets and sandboxed Java Web Start applications, which load and run untrusted code, for example, code coming from the internet.

Vulnerability (2) is frequently not applicable to Java deployments, where only trusted code is loaded and run on servers (for example, code provided by an administrator).

Original advisories

Oracle Critical Patch Update Advisory

Related products

Oracle-Java-JRE-1.7.x

Oracle-Java-JDK-1.7.x

Oracle-Java-JDK-1.8.x-3

Oracle-Java-JRE-1.8.x

Oracle-JRockit

CVE list

CVE-2016-5547 warning

CVE-2016-5549 warning

Solution

Update to the latest versions

Get Java SE

Impacts

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Oracle Java SE 7u121Oracle Java SE 8u112Oracle Java SE Embedded 8u111Oracle JRockit R28.3.12

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

7.6 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.1%