CNVD-2018-03877

Vulnerability from cnvd - Published: 2018-02-28
VLAI Severity ?
Title
IBM Runtimes for Java Technology J9 JVM权限提升漏洞
Description
IBM Runtimes for Java Technology是美国IBM公司的一套运行Java程序的运行时环境。J9 JVM是使用在其中的一个Java虚拟机。 IBM Runtimes for Java Technology中的J9 JVM存在权限提升漏洞。攻击者可利用该漏洞提升权限。
Severity
Patch Name
IBM Runtimes for Java Technology J9 JVM权限提升漏洞的补丁
Patch Description
IBM Runtimes for Java Technology是美国IBM公司的一套运行Java程序的运行时环境。J9 JVM是使用在其中的一个Java虚拟机。 IBM Runtimes for Java Technology中的J9 JVM存在权限提升漏洞。攻击者可利用该漏洞提升权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.ibm.com/support/docview.wss?uid=swg22012965

Reference
https://www.ibm.com/support/docview.wss?uid=swg22012965
Impacted products
Name
['IBM SDK, Java Technology Edition 6.0 SR11 for Linux 32-bit x86, build pxi3260sr11-20120806_01(SR11), 2012-08-10发行', 'IBM SDK, Java Technology Edition 7.0 SR1 for Linux 32-bit x86, build pxi3270sr1-20120330_01(SR1), 2012-04-30发行', 'IBM SDK <=7 Service Refresh 10 Fix Pack 15', 'IBM SDK <=7R1 Service Refresh 4 Fix Pack 15', 'IBM SDK <=8 Service Refresh 5 Fix Pack 7', 'IBM Java Technology Edition <=6 Service Refresh 16 Fix Pack 55', 'IBM Java Technology Edition <=6R1 Service Refresh 8 Fix Pack 55', 'IBM Java Technology Edition <=7R1 Service Refresh 4 Fix Pack 15', 'IBM Java Technology Edition <=8 Service Refresh 5 Fix Pack 7', 'IBM Java Technology Edition <=7 Service Refresh 10 Fix Pack 15']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-1417"
    }
  },
  "description": "IBM Runtimes for Java Technology\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u5957\u8fd0\u884cJava\u7a0b\u5e8f\u7684\u8fd0\u884c\u65f6\u73af\u5883\u3002J9 JVM\u662f\u4f7f\u7528\u5728\u5176\u4e2d\u7684\u4e00\u4e2aJava\u865a\u62df\u673a\u3002\r\n\r\nIBM Runtimes for Java Technology\u4e2d\u7684J9 JVM\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u5347\u6743\u9650\u3002",
  "discovererName": "IBM",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.ibm.com/support/docview.wss?uid=swg22012965",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-03877",
  "openTime": "2018-02-28",
  "patchDescription": "IBM Runtimes for Java Technology\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u5957\u8fd0\u884cJava\u7a0b\u5e8f\u7684\u8fd0\u884c\u65f6\u73af\u5883\u3002J9 JVM\u662f\u4f7f\u7528\u5728\u5176\u4e2d\u7684\u4e00\u4e2aJava\u865a\u62df\u673a\u3002\r\n\r\nIBM Runtimes for Java Technology\u4e2d\u7684J9 JVM\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u5347\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "IBM Runtimes for Java Technology J9 JVM\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "IBM SDK, Java Technology Edition 6.0 SR11 for Linux 32-bit x86, build pxi3260sr11-20120806_01(SR11), 2012-08-10\u53d1\u884c",
      "IBM SDK, Java Technology Edition 7.0 SR1 for Linux 32-bit x86, build pxi3270sr1-20120330_01(SR1), 2012-04-30\u53d1\u884c",
      "IBM SDK \u003c=7 Service Refresh 10 Fix Pack 15",
      "IBM SDK \u003c=7R1 Service Refresh 4 Fix Pack 15",
      "IBM SDK \u003c=8 Service Refresh 5 Fix Pack 7",
      "IBM Java Technology Edition \u003c=6 Service Refresh 16 Fix Pack 55",
      "IBM Java Technology Edition \u003c=6R1 Service Refresh 8 Fix Pack 55",
      "IBM Java Technology Edition \u003c=7R1 Service Refresh 4 Fix Pack 15",
      "IBM Java Technology Edition \u003c=8 Service Refresh 5 Fix Pack 7",
      "IBM Java Technology Edition \u003c=7 Service Refresh 10 Fix Pack 15"
    ]
  },
  "referenceLink": "https://www.ibm.com/support/docview.wss?uid=swg22012965",
  "serverity": "\u9ad8",
  "submitTime": "2018-02-26",
  "title": "IBM Runtimes for Java Technology J9 JVM\u6743\u9650\u63d0\u5347\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…