CVE-2018-2783

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152; Java SE Embedded: 8u152; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
References
Link Resource
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch Vendor Advisory
http://www.securityfocus.com/bid/103832 Broken Link
http://www.securitytracker.com/id/1040697 Broken Link
https://access.redhat.com/errata/RHSA-2018:1203 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1205 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1721 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1722 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1723 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1724 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1974 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1975 Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://security.netapp.com/advisory/ntap-20180419-0001/ Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us Third Party Advisory
https://usn.ubuntu.com/3644-1/ Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch Vendor Advisory
http://www.securityfocus.com/bid/103832 Broken Link
http://www.securitytracker.com/id/1040697 Broken Link
https://access.redhat.com/errata/RHSA-2018:1203 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1205 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1721 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1722 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1723 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1724 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1974 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1975 Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://security.netapp.com/advisory/ntap-20180419-0001/ Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us Third Party Advisory
https://usn.ubuntu.com/3644-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*

History

21 Nov 2024, 04:04

Type Values Removed Values Added
References () http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/103832 - Broken Link () http://www.securityfocus.com/bid/103832 - Broken Link
References () http://www.securitytracker.com/id/1040697 - Broken Link () http://www.securitytracker.com/id/1040697 - Broken Link
References () https://access.redhat.com/errata/RHSA-2018:1203 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1203 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1205 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1205 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1721 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1721 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1722 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1722 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1723 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1723 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1724 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1724 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1974 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1974 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1975 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1975 - Third Party Advisory
References () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - Third Party Advisory () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20180419-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20180419-0001/ - Third Party Advisory
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us - Third Party Advisory () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us - Third Party Advisory
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us - Third Party Advisory () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us - Third Party Advisory
References () https://usn.ubuntu.com/3644-1/ - Third Party Advisory () https://usn.ubuntu.com/3644-1/ - Third Party Advisory

Information

Published : 2018-04-19 02:29

Updated : 2024-11-21 04:04


NVD link : CVE-2018-2783

Mitre link : CVE-2018-2783

CVE.ORG link : CVE-2018-2783


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • satellite
  • enterprise_linux_workstation

oracle

  • jdk
  • jrockit
  • jre

canonical

  • ubuntu_linux

hp

  • xp7_command_view