Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-12547

Опубликовано: 01 мар. 2019
Источник: redhat
CVSS3: 9.8

Описание

In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.

Отчет

This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=1685611JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 7 лет назад

In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.

CVSS3: 9.8
github
больше 3 лет назад

In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.

CVSS3: 9.8
fstec
около 7 лет назад

Уязвимость функций jio_snprintf и jio_vsnprintf виртуальной машины Eclipse OpenJ9, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

9.8 Critical

CVSS3