CVE-2018-2799

Severity

50%

Complexity

99%

Confidentiality

48%

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

CVSS 3.0 Base Score 5.3. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).

Overview

First reported 6 years ago

2018-04-19 02:29:00

Last updated 5 years ago

2019-10-18 21:15:00

Affected Software

Oracle JDK 1.7.0 Update 171

1.7.0

Oracle JDK 1.8.0 Update 162

1.8.0

Oracle JRockit R28.3.17

r28.3.17

Red Hat Satellite 5.6

5.6

Red Hat Satellite 5.7

5.7

Red Hat Satellite 5.8

5.8

Red Hat Enterprise Linux Desktop 6.0

6.0

RedHat Enterprise Linux Desktop 7.0

7.0

Red Hat Enterprise Linux Server 6.0

6.0

RedHat Enterprise Linux Server 7.0

7.0

Red Hat Enterprise Linux Server Advanced mission critical Update Support (AUS) 7.6

7.6

Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.5

7.5

Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.6

7.6

Red Hat Enterprise Linux Server Telecommunications Update Service (TUS) 7.6

7.6

Red Hat Enterprise Linux Workstation 6.0

6.0

RedHat Enterprise Linux Workstation 7.0

7.0

Debian Linux 8.0 (Jessie)

8.0

Debian Linux 9.0

9.0

Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)

14.04

Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)

16.04

Canonical Ubuntu Linux 17.10

17.10

References

http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

Patch, Vendor Advisory

103872

Third Party Advisory, VDB Entry

1040697

Third Party Advisory, VDB Entry

RHSA-2018:1188

Third Party Advisory

RHSA-2018:1191

Third Party Advisory

RHSA-2018:1201

Third Party Advisory

RHSA-2018:1202

Third Party Advisory

RHSA-2018:1204

Third Party Advisory

RHSA-2018:1206

Third Party Advisory

RHSA-2018:1270

Third Party Advisory

RHSA-2018:1278

Third Party Advisory

RHSA-2018:1721

Third Party Advisory

RHSA-2018:1722

Third Party Advisory

RHSA-2018:1723

Third Party Advisory

RHSA-2018:1724

Third Party Advisory

RHSA-2018:1974

Third Party Advisory

RHSA-2018:1975

Third Party Advisory

https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0

Third Party Advisory

[j-users] 20180503 [ANNOUNCEMENT]: Apache Xerces-J 2.12.0 now available

Mailing List, Release Notes, Third Party Advisory

[xmlgraphics-fop-dev] 20191018 [jira] [Created] (FOP-2885) Security Vulnerability with Xerces version <= 2.11

[spark-user] 20200224 [SPARK Dependencies] Security Vulnerability with Xerces version < 2.12

GLSA-201903-14

Third Party Advisory

https://security.netapp.com/advisory/ntap-20180419-0001/

Third Party Advisory

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us

Third Party Advisory

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us

Third Party Advisory

USN-3644-1

Third Party Advisory

USN-3691-1

Third Party Advisory

DSA-4185

Third Party Advisory

DSA-4225

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.