Vulnerability Description
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oracle | Jdk | 1.7.0 |
| Oracle | Jre | 1.7.0 |
| Oracle | Jrockit | r28.3.14 |
| Debian | Debian Linux | 8.0 |
| Phoenixcontact | Fl Mguard Dm | <= 1.8.0 |
| Netapp | Active Iq Unified Manager | >= 7.3 |
| Netapp | Cloud Backup | - |
| Netapp | E-Series Santricity Os Controller | >= 11.0, <= 11.70.1 |
| Netapp | E-Series Santricity Storage Manager | - |
| Netapp | Element Software | - |
| Netapp | Oncommand Balance | - |
| Netapp | Oncommand Insight | - |
| Netapp | Oncommand Performance Manager | - |
| Netapp | Oncommand Shift | - |
| Netapp | Oncommand Unified Manager | <= 7.1 |
| Netapp | Plug-In For Symantec Netbackup | - |
| Netapp | Snapmanager | - |
| Netapp | Steelstore Cloud Integrated Storage | - |
| Netapp | Storage Replication Adapter For Clustered Data Ontap | >= 7.2 |
| Netapp | Vasa Provider For Clustered Data Ontap | >= 7.2 |
References
- http://www.debian.org/security/2017/dsa-3919Third Party Advisory
- http://www.debian.org/security/2017/dsa-3954Third Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/99782Broken Link
- http://www.securitytracker.com/id/1038931Broken Link
- https://access.redhat.com/errata/RHSA-2017:1790Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1791Third Party Advisory
- https://cert.vde.com/en-us/advisories/vde-2017-002Third Party Advisory
- https://security.gentoo.org/glsa/201709-22Third Party Advisory
- https://security.netapp.com/advisory/ntap-20170720-0001/Third Party Advisory
- http://www.debian.org/security/2017/dsa-3919Third Party Advisory
- http://www.debian.org/security/2017/dsa-3954Third Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/99782Broken Link
- http://www.securitytracker.com/id/1038931Broken Link
FAQ
What is CVE-2017-10118?
CVE-2017-10118 is a vulnerability with a CVSS score of 7.5 (HIGH). Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRo...
How severe is CVE-2017-10118?
CVE-2017-10118 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-10118?
Check the references section above for vendor advisories and patch information. Affected products include: Oracle Jdk, Oracle Jre, Oracle Jrockit, Debian Debian Linux, Phoenixcontact Fl Mguard Dm.