Vulnerability CVE-2017-10135


Published: 2017-08-08

Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

Type:

CWE-noinfo

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Oracle -> JRE 
Oracle -> Jrockit 
Oracle -> JDK 

 References:
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.securityfocus.com/bid/99839
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://cert.vde.com/en-us/advisories/vde-2017-002
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/

Copyright 2024, cxsecurity.com

 

Back to Top