We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2018-2641



Assigneroracle
Reserved2017-12-15
Published2018-01-18
Updated2024-10-03

Description

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).

Product status

Java SE: 6u171
affected

7u161
affected

8u152
affected

9.0.1; Java SE Embedded: 8u151
affected

References

https://access.redhat.com/errata/RHSA-2018:0351 (RHSA-2018:0351) vendor-advisory

http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

https://security.netapp.com/advisory/ntap-20180117-0001/

https://usn.ubuntu.com/3614-1/ (USN-3614-1) vendor-advisory

https://www.debian.org/security/2018/dsa-4166 (DSA-4166) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0095 (RHSA-2018:0095) vendor-advisory

https://www.debian.org/security/2018/dsa-4144 (DSA-4144) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0521 (RHSA-2018:0521) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0352 (RHSA-2018:0352) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0115 (RHSA-2018:0115) vendor-advisory

https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0

https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html ([debian-lts-announce] 20180403 [SECURITY] [DLA 1339-1] openjdk-7 security update) mailing-list

https://access.redhat.com/errata/RHSA-2018:1812 (RHSA-2018:1812) vendor-advisory

http://www.securityfocus.com/bid/102605 (102605) vdb-entry

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us

https://access.redhat.com/errata/RHSA-2018:0099 (RHSA-2018:0099) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:1463 (RHSA-2018:1463) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0458 (RHSA-2018:0458) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0349 (RHSA-2018:0349) vendor-advisory

http://www.securitytracker.com/id/1040203 (1040203) vdb-entry

https://usn.ubuntu.com/3613-1/ (USN-3613-1) vendor-advisory

https://access.redhat.com/errata/RHSA-2018:0100 (RHSA-2018:0100) vendor-advisory

cve.org CVE-2018-2641

nvd.nist.gov CVE-2018-2641

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2018-2641

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.