We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2018-2634



Assigneroracle
Reserved2017-12-15
Published2018-01-18
Updated2024-10-03

Description

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).

Product status

Java SE: 7u161
affected

8u152
affected

9.0.1; Java SE Embedded: 8u151
affected

References

https://access.redhat.com/errata/RHSA-2018:0351 (RHSA-2018:0351) vendor-advisory

http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

https://security.netapp.com/advisory/ntap-20180117-0001/

https://usn.ubuntu.com/3614-1/ (USN-3614-1) vendor-advisory

https://www.debian.org/security/2018/dsa-4166 (DSA-4166) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0095 (RHSA-2018:0095) vendor-advisory

https://www.debian.org/security/2018/dsa-4144 (DSA-4144) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0521 (RHSA-2018:0521) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0352 (RHSA-2018:0352) vendor-advisory

https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0

https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html ([debian-lts-announce] 20180403 [SECURITY] [DLA 1339-1] openjdk-7 security update) mailing-list

https://access.redhat.com/errata/RHSA-2018:1812 (RHSA-2018:1812) vendor-advisory

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us

https://access.redhat.com/errata/RHSA-2018:0099 (RHSA-2018:0099) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:1463 (RHSA-2018:1463) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0458 (RHSA-2018:0458) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0349 (RHSA-2018:0349) vendor-advisory

http://www.securitytracker.com/id/1040203 (1040203) vdb-entry

http://www.securityfocus.com/bid/102592 (102592) vdb-entry

https://usn.ubuntu.com/3613-1/ (USN-3613-1) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0100 (RHSA-2018:0100) vendor-advisory

cve.org CVE-2018-2634

nvd.nist.gov CVE-2018-2634

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2018-2634
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.