SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java SE Vendors:   Oracle, Sun
(Oracle Issues Fix for Oracle Linux) Oracle Java SE Multiple Flaws Let Remote Users Access and Modify Data, Deny Service, and Gain Elevated Privileges
SecurityTracker Alert ID:  1039636
SecurityTracker URL:  http://securitytracker.com/id/1039636
CVE Reference:   CVE-2017-10274, CVE-2017-10281, CVE-2017-10345, CVE-2017-10347, CVE-2017-10348   (Links to External Site)
Date:  Oct 20 2017
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6u161, 7u151, 8u144
Description:   Multiple vulnerabilities were reported in Oracle Java SE. A remote user can access data and modify on the target system. A remote user can cause denial of service conditions on the target system. A remote user can gain elevated privileges.

A remote user can exploit a flaw in the Hotspot component to gain elevated privileges [CVE-2017-10346].

A remote user can exploit a flaw in the RMI component to gain elevated privileges [CVE-2017-10285].

A remote user can exploit a flaw in the Libraries component to gain elevated privileges [CVE-2017-10388].

A remote user can exploit a flaw in the Deployment component to partially access data, partially modify data, and partially deny service [CVE-2017-10309].

A remote user can exploit a flaw in the Smart Card IO component to access and modify data [CVE-2017-10274].

A local user can exploit a flaw in the Security component to access data [CVE-2017-10356].

A remote user can exploit a flaw in the Javadoc component to partially access and partially modify data [CVE-2017-10293].

A remote user can exploit a flaw in the Server component to cause partial denial of service conditions [CVE-2017-10342].

A remote user can exploit a flaw in the JAX-WS component to cause partial denial of service conditions [CVE-2017-10350].

A remote user can exploit a flaw in the JAXP component to cause partial denial of service conditions [CVE-2017-10349].

A remote user can exploit a flaw in the Libraries component to cause partial denial of service conditions [CVE-2017-10348].

A remote user can exploit a flaw in the Serialization component to cause partial denial of service conditions [CVE-2017-10357].

A remote user can exploit a flaw in the Util (zlib) component to partially modify data [CVE-2016-9841].

A remote user can exploit a flaw in the 2D (Little CMS 2) component to partially access data [CVE-2016-10165].

A remote user can exploit a flaw in the Networking component to cause partial denial of service conditions [CVE-2017-10355].

A remote user can exploit a flaw in the Serialization component to cause partial denial of service conditions [CVE-2017-10281, CVE-2017-10347].

A remote authenticated user can exploit a flaw in the Sever component to partially access and partially modify data [CVE-2017-10386].

A remote user can exploit a flaw in the Server component to partially access and partially modify data [CVE-2017-10380].

A remote user can exploit a flaw in the Networking component to partially modify data [CVE-2017-10295].

A remote user can exploit a flaw in the Server component to partially modify data [CVE-2017-10341].

A remote user can exploit a flaw in the Serialization component to cause partial denial of service conditions [CVE-2017-10345].

An Anonymous researcher (via Beyond Security's SecuriTeam Secure Disclosure Program), Daniel Frojdendahl, Francesco Palmarini of Ca Foscari University of Venice, Gaston Traberg of Onapsis, Jeffrey Altman of Secure Endpoints Inc.,
Marco Squarcina of Ca Foscari University of Venice, Mauro Tempesta of Ca Foscari University of Venice, Orange Tsai, Riccardo Focardi of Ca Foscari University of Venice, Steven Seeley of Source Incite, Tamas Szakaly, and Tobias Ospelt of modzero reported these vulnerabilities.

Impact:   A remote user can obtain data on the target system.

A remote user can modify data on the target system.

A remote user can cause denial of service conditions.

A remote user can gain elevated privileges on the target system.

Solution:   Oracle has issued a fix for CVE-2017-10274, CVE-2017-10281, CVE-2017-10345, CVE-2017-10347, and CVE-2017-10348.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2017-2998.html

Vendor URL:  linux.oracle.com/errata/ELSA-2017-2998.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6, 7

Message History:   This archive entry is a follow-up to the message listed below.
Oct 17 2017 Oracle Java SE Multiple Flaws Let Remote Users Access and Modify Data, Deny Service, and Gain Elevated Privileges



 Source Message Contents

Subject:  [El-errata] ELSA-2017-2998 Critical: Oracle Linux 7 java-1.8.0-openjdk security update

Oracle Linux Security Advisory ELSA-2017-2998

http://linux.oracle.com/errata/ELSA-2017-2998.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4.noarch.rpm
java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4.noarch.rpm
java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4.noarch.rpm
java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4.noarch.rpm
java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4.x86_64.rpm
java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4.i686.rpm
java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm



Description of changes:

[1:1.8.0.151-1.b12]
- Reverting to java-1.7.0-openjdk on AArch64 as 
rhel-7.4-z-java-unsafe-candidate using wrong suffix.
- Resolves: rhbz#1499207

[1:1.8.0.151-1.b12]
- repack policies adapted to new counts and paths
- note that also c-j-c is needed to make this apply in next update
- Resolves: rhbz#1499207

[1:1.8.0.151-0.b12]
- Update location of policy JAR files following 8157561.

[1:1.8.0.151-0.b12]
- 8188030 is not yet upstream, so it should be listed under upstreamable 
fixes.
- 8181055, 8181419, 8145913, 8168318, 8170328 & 8181810 all now in 8u162.
- Resolves: rhbz#1499207

[1:1.8.0.151-0.b12]
- Correct fix to RH1191652 root patch so existing COMMON_CCXXFLAGS_JDK 
is not lost.
- Resolves: rhbz#1499207

[1:1.8.0.151-0.b01]
- Moving patch 560 out of ppc fixes
- Resolves: rhbz#1499207

[1:1.8.0.151-0.b12]
- Update SystemTap tapsets to version in IcedTea 3.6.0pre02 to fix 
RH1492139.
- Resolves: rhbz#1499207

[1:1.8.0.151-0.b12]
- Fix premature shutdown of NSS in SunEC provider.
- Resolves: rhbz#1499207

[1:1.8.0.151-0.b12]
- Add 8075484/PR3473/RH1490713 which is listed as being in 8u151 but not 
supplied by Oracle.
- Resolves: rhbz#1499207

[1:1.8.0.151-0.b12]
- Switch AArch64 to using java-1.8.0-openjdk to bootstrap until 
RH1482244 is fixed in bootstrap
- Resolves: rhbz#1499207

[1:1.8.0.151-0.b12]
- Update to aarch64-jdk8u151-b12 and aarch64-shenandoah-jdk8u151-b12.
- Update location of OpenJDK zlib system library source code in 
remove-intree-libraries.sh
- Drop upstreamed patches for 8179084 and RH1367357 (part of 8183028).
- Update RH1191652 (root) and PR2842 to accomodate 8151841 (GCC 6 support).
- Update PR2964/RH1337583 to accomodate 8171319 (keytool warning output)
- Update RH1163501 to accomodate 8181048 (crypto refactoring)
- Resolves: rhbz#1499207

[1:1.8.0.144-1.b01]
- Add IBM-supplied Montgomery backport, backport other ppc64 fixes & add 
CFF fix
- Resolves: rhbz#1499207


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC