Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-2942

Опубликовано: 18 июл. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.1
CVSS3: 8.3

Описание

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Windows DLL). Supported versions that are affected are Java SE: 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/...

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

oracle only
devel

not-affected

oracle only
esm-apps/bionic

not-affected

oracle only
esm-apps/xenial

not-affected

oracle only
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [oracle only]]
precise/esm

DNE

trusty

not-affected

oracle only
trusty/esm

DNE

trusty was not-affected [oracle only]
upstream

not-affected

oracle only

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [oracle only]]
precise/esm

DNE

trusty

not-affected

oracle only
trusty/esm

DNE

trusty was not-affected [oracle only]
upstream

not-affected

oracle only
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [oracle only]]
precise/esm

DNE

trusty

not-affected

oracle only
trusty/esm

DNE

trusty was not-affected [oracle only]
upstream

not-affected

oracle only
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

oracle only
devel

not-affected

oracle only
esm-apps/bionic

not-affected

oracle only
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

oracle only
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

oracle only

Показывать по

РелизСтатусПримечание
artful

ignored

end of life
bionic

DNE

devel

DNE

esm-apps/xenial

not-affected

oracle only
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

oracle only
xenial

not-affected

oracle only

Показывать по

РелизСтатусПримечание
bionic

not-affected

oracle only
devel

not-affected

oracle only
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

oracle only
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

oracle only
xenial

DNE

Показывать по

Ссылки на источники

EPSS

Процентиль: 69%
0.00605
Низкий

5.1 Medium

CVSS2

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 7 лет назад

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Windows DLL). Supported versions that are affected are Java SE: 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/...

CVSS3: 8.3
nvd
больше 7 лет назад

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Windows DLL). Supported versions that are affected are Java SE: 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:

CVSS3: 8.3
debian
больше 7 лет назад

Vulnerability in the Java SE component of Oracle Java SE (subcomponent ...

CVSS3: 8.3
github
больше 3 лет назад

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Windows DLL). Supported versions that are affected are Java SE: 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/...

EPSS

Процентиль: 69%
0.00605
Низкий

5.1 Medium

CVSS2

8.3 High

CVSS3

Уязвимость CVE-2018-2942