NVD Vulnerability Detail
Search Exploit, PoC
CVE-2018-2629
Summary

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).

Publication Date Jan. 18, 2018, 11:29 a.m.
Registration Date March 1, 2021, 7:22 p.m.
Last Update Nov. 21, 2024, 1:04 p.m.
CVSS3.1 : MEDIUM
スコア 5.3
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI)
影響の想定範囲(S) 変更なし
機密性への影響(C) なし
完全性への影響(I)
可用性への影響(A) なし
CVSS2.0 : LOW
Score 2.6
Vector AV:N/AC:H/Au:N/C:N/I:P/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C) なし
完全性への影響(I)
可用性への影響(A) なし
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required はい
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:oracle:jrockit:r28.3.16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update171:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update171:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:9.0.1:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:* 7.6.0
Configuration6 or higher or less more than less than
cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:* 8.6.2-01
cpe:2.3:a:hp:xp_p9000_command_view:*:*:*:*:advanced:*:*:* 8.6.2-01
cpe:2.3:a:hp:xp_command_view:*:*:*:*:advanced:*:*:* 8.6.2-01
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
複数の Oracle Java 製品における JGSS に関する脆弱性
Title 複数の Oracle Java 製品における JGSS に関する脆弱性
Summary

Oracle Java SE、Java SE Embedded および JRockit には、JGSS に関する処理に不備があるため、完全性に影響のある脆弱性が存在します。

Possible impacts リモートの攻撃者により、情報を改ざんされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Jan. 16, 2018, midnight
Registration Date Feb. 2, 2018, 3:36 p.m.
Last Update Feb. 13, 2018, 2:18 p.m.
Affected System
オラクル
JDK 6 Update 171
JDK 7 Update 161
JDK 8 Update 152
JDK 9.0.1
JRE 6 Update 171
JRE 7 Update 161
JRE 8 Update 152
JRE 9.0.1
Oracle Java SE Embedded 8 Update 151
Oracle JRockit R28.3.16
日立
Cosminexus Developer's Kit for Java(TM) 
Hitachi Application Server 
Hitachi Application Server for Developers 
Hitachi Automation Director 
Hitachi Compute Systems Manager 
Hitachi Compute Systems Manager Software
Hitachi Configuration Manager 
Hitachi Developer's Kit for Java 
Hitachi Device Manager 
Hitachi Device Manager Software
Hitachi Dynamic Link Manager 
Hitachi Dynamic Link Manager Software
Hitachi Global Link Manager 
Hitachi Global Link Manager Software
Hitachi Infrastructure Analytics Advisor 
Hitachi Replication Manager 
Hitachi Replication Manager Software
Hitachi Tiered Storage Manager 
Hitachi Tiered Storage Manager Software
Hitachi Tuning Manager 
Hitachi Tuning Manager Software
uCosminexus Application Server 
uCosminexus Application Server (64)
uCosminexus Application Server Enterprise 
uCosminexus Application Server Standard 
uCosminexus Application Server Standard -R
uCosminexus Client 
uCosminexus Developer 
uCosminexus Developer Professional
uCosminexus Developer Standard 
uCosminexus Service Architect 
uCosminexus Service Platform 
uCosminexus Service Platform (64)
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2018年02月02日]
  掲載
[2018年02月13日]
  影響を受けるシステム:ベンダ情報の追加に伴い内容を更新
  ベンダ情報:日立 (hitachi-sec-2018-105) を追加
Feb. 17, 2018, 10:37 a.m.