Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-2794
HistoryApr 18, 2018 - 12:00 a.m.

CVE-2018-2794

2018-04-1800:00:00
ubuntu.com
ubuntu.com
11

7.7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

49.7%

Vulnerability in the Java SE, JRockit component of Oracle Java SE
(subcomponent: Security). Supported versions that are affected are Java SE:
6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit
vulnerability allows unauthenticated attacker with logon to the
infrastructure where Java SE, JRockit executes to compromise Java SE,
JRockit. Successful attacks require human interaction from a person other
than the attacker and while the vulnerability is in Java SE, JRockit,
attacks may significantly impact additional products. Successful attacks of
this vulnerability can result in takeover of Java SE, JRockit. Note:
Applies to client and server deployment of Java. This vulnerability can be
exploited through sandboxed Java Web Start applications and sandboxed Java
applets. It can also be exploited by supplying data to APIs in the
specified Component without using sandboxed Java Web Start applications or
sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score
7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector:
(CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).

Notes

Author Note
sbeattie Oracle release notes on this issue: Enhanced KeyStore Mechanisms A new security property named jceks.key.serialFilter has been introduced. If this filter is configured, the JCEKS KeyStore uses it during the deserialization of the encrypted Key object stored inside a SecretKeyEntry. If it is not configured or if the filter result is UNDECIDED (for example, none of the patterns match), then the filter configured by jdk.serialFilter is consulted. If the system property jceks.key.serialFilter is also supplied, it supersedes the security property value defined here. The filter pattern uses the same format as jdk.serialFilter. The default pattern allows java.lang.Enum, java.security.KeyRep, java.security.KeyRep$Type, and javax.crypto.spec.SecretKeySpec but rejects all the others. Customers storing a SecretKey that does not serialize to the above types must modify the filter to make the key extractable.
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchopenjdk-7< 7u181-2.6.14-0ubuntu0.1UNKNOWN
ubuntu17.10noarchopenjdk-8< 8u171-b11-0ubuntu0.17.10.1UNKNOWN
ubuntu18.04noarchopenjdk-8< 8u171-b11-0ubuntu0.18.04.1UNKNOWN
ubuntu16.04noarchopenjdk-8< 8u171-b11-0ubuntu0.16.04.1UNKNOWN

7.7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

49.7%