Lucene search

K
kasperskyKaspersky LabKLA11234
HistoryApr 17, 2018 - 12:00 a.m.

KLA11234 Multiple vulnerabilities in Oracle Java SE, Java SE Embedded and JRockit

2018-04-1700:00:00
Kaspersky Lab
threats.kaspersky.com
2297

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.8

Confidence

Low

EPSS

0.004

Percentile

73.2%

Multiple serious vulnerabilities have been found in Oracle products. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, obtain sensitive information, cause denial of service and perform unspecified attacks.

Below is a complete list of vulnerabilities:

  1. Multiple unspecified vulnerabilities in the Libraries component can be exploited remotely to bypass security restrictions;
  2. An unspecified vulnerability in the Libraries component can be exploited remotely to bypass security restrictions;
  3. An unspecified vulnerability in the Install component can be exploited locally to perform unspecified attacks;
  4. An unspecified vulnerability in the Security component can be exploited locally via a specially crafted JCEKS key store to execute arbitrary code and obtain sensitive information;
  5. An unspecified vulnerability in the Security component can be exploited remotely to perform unspecified attacks;
  6. An unbounded memory allocation during deserialization in Container can be exploited remotely via specially crafted input to cause denial of service;
  7. An unbounded memory allocation during deserialization in PriorityBlockingQueue can be exploited remotely via specially crafted input to cause denial of service;
  8. An unbounded memory allocation during deserialization in NamedNodeMapImpl can be exploited remotely via specially crafted input to cause denial of service;
  9. An unbounded memory allocation during deserialization in TabularDataSupport can be exploited remotely via specially crafted input to cause denial of service;
  10. An insufficient consistency checks in deserialization of multiple classes in the Security component can be exploited remotely via specially crafted input to cause denial of service;
  11. An unbounded memory allocation during deserialization in StubIORImpl can be exploited remotely via specially crafted input to cause denial of service;
  12. An unspecified vulnerabilities in the RMI can be exploited remotely to bypass security restrictions;
  13. An incorrect merging of sections in the JAR manifest can be exploited remotely to bypass security restrictions.

Technical details

Java SE 10 is affected by vulnerabilities (1)-(11) and (13)

Java SE 8 is affected by vulnerabilities (2)-(13)

Java SE 6 and 7 is affected by vulnerabilities (2) and (4)-(13)

Java SE Embedded 8 is affected by vulnerabilities (2), (5)-(11) and (13)

JRockit is affected by vulnerabilities (5)-(12)

Original advisories

Oracle Critical Patch Update Advisory – April 2018

Related products

Oracle-Java-JRE-1.7.x

Oracle-Java-JRE-1.8.x

Oracle-JRockit

Oracle-Java-JRE-1.10.x

CVE list

CVE-2018-2811 warning

CVE-2018-2814 high

CVE-2018-2815 warning

CVE-2018-2783 high

CVE-2018-2826 high

CVE-2018-2790 warning

CVE-2018-2825 high

CVE-2018-2794 warning

CVE-2018-2795 warning

CVE-2018-2796 warning

CVE-2018-2797 warning

CVE-2018-2798 warning

CVE-2018-2799 warning

CVE-2018-2800 warning

Solution

Update to the latest version

Oracle software downloads

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • LoI

Loss of integrity. Exploitation of vulnerabilities with this impact can lead to partial system fault or system components connection disruption.

Affected Products

  • Java SE 6u181 and earlierJava SE 7u171 and earlierJava SE 8u171 and earlierJava SE 10.0.1 and earlierJava SE Embedded 8u161 and earlierJRockit R28.3.17 and earlier

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.8

Confidence

Low

EPSS

0.004

Percentile

73.2%