Lucene search

K
ibmIBM2AFE213A1E7968795DAB8603AEA80E1BD5AFBE4D88D709D23FFE737F4D8C36CE
HistoryMay 30, 2024 - 1:50 p.m.

Security Bulletin: CVE-2024-3933 affects IBM® SDK, Java™ Technology Edition

2024-05-3013:50:30
www.ibm.com
11
ibm sdk
java technology edition
vulnerability
buffer
security restrictions
update
zlinux
download
developerworks license
ibm support

5.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Summary

CVE-2024-3933 affects IBM SDK, Java Technology Edition. An update has been released to address the vulnerability.

Vulnerability Details

CVEID:CVE-2024-3933
**DESCRIPTION:**Eclipse Openj9 could allow a local authenticated attacker to bypass security restrictions, caused by the failure to restrict access to a buffer with an incorrect length value when executing an arraycopy sequence while the Concurrent Scavenge Garbage Collection cycle is active and the source and destination memory regions for arraycopy overlap. By sending a specially crafted request, an attacker could exploit this vulnerability to gain read and write to addresses beyond the end of the array range.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/292491 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM SDK, Java Technology Edition 8.0.0.0 - 8.0.8.21

Note: This issue is applicable to IBM SDK, Java Technology Edition on zLinux only.

Remediation/Fixes

8.0.8.25

IBM SDK, Java Technology Edition releases can be downloaded, subject to the terms of the developerWorks license, from the Java Developer Center.

IBM customers requiring an update for an SDK shipped with an IBM product should contact IBM support, and/or refer to the appropriate product security bulletin.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmjavaMatchany
CPENameOperatorVersion
ibm javaeqany

5.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for 2AFE213A1E7968795DAB8603AEA80E1BD5AFBE4D88D709D23FFE737F4D8C36CE