Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Installer). Supported versions that are affected are Java SE: 8u152 and 9.0.1. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to the Windows installer only. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H).
References
Link | Resource |
---|---|
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/102584 | Broken Link Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040203 | Broken Link Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:0099 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:1463 | Third Party Advisory |
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20180117-0001/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2023, 19:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:jdk:1.9.0.1:*:*:*:*:*:*:* |
cpe:2.3:a:oracle:jdk:9.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:9.0.1:*:*:*:*:*:*:* |
References | (BID) http://www.securityfocus.com/bid/102584 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECTRACK) http://www.securitytracker.com/id/1040203 - Broken Link, Third Party Advisory, VDB Entry |
Information
Published : 2018-01-18 02:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-2627
Mitre link : CVE-2018-2627
CVE.ORG link : CVE-2018-2627
JSON object : View
Products Affected
netapp
- e-series_santricity_web_services
- plug-in_for_symantec_netbackup
- e-series_santricity_management_plug-ins
- vasa_provider_for_clustered_data_ontap
- snapmanager
- oncommand_shift
- e-series_santricity_os_controller
- cloud_backup
- oncommand_insight
- oncommand_unified_manager
- virtual_storage_console
- storagegrid
- storage_replication_adapter_for_clustered_data_ontap
- active_iq_unified_manager
- santricity_cloud_connector
- e-series_santricity_storage_manager
- oncommand_workflow_automation
redhat
- satellite
oracle
- jdk
- jre
CWE