CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
71.9%
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:* |
oracle | jdk | 1.7.0 | cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:* |
oracle | jdk | 1.8.0 | cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:* |
oracle | jdk | 1.9.0 | cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:* |
oracle | jre | 1.6.0 | cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:* |
oracle | jre | 1.8.0 | cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:* |
oracle | jre | 1.9.0 | cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:* |
redhat | satellite | 5.8 | cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 6.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* |
www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
www.securityfocus.com/bid/101321
www.securitytracker.com/id/1039596
access.redhat.com/errata/RHSA-2017:2998
access.redhat.com/errata/RHSA-2017:2999
access.redhat.com/errata/RHSA-2017:3046
access.redhat.com/errata/RHSA-2017:3047
access.redhat.com/errata/RHSA-2017:3264
access.redhat.com/errata/RHSA-2017:3267
access.redhat.com/errata/RHSA-2017:3268
access.redhat.com/errata/RHSA-2017:3392
access.redhat.com/errata/RHSA-2017:3453
lists.debian.org/debian-lts-announce/2017/11/msg00033.html
security.gentoo.org/glsa/201710-31
security.gentoo.org/glsa/201711-14
security.netapp.com/advisory/ntap-20171019-0001/
www.debian.org/security/2017/dsa-4015
www.debian.org/security/2017/dsa-4048
www.synology.com/support/security/Synology_SA_17_66_OpenJDK
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
71.9%