New Search

Vulnerability in the Java SE JRockit component of Oracle Java SE (subcomponent: Security) - CVE-2018-2794

oval:org.cisecurity:def:5303

Vulnerability in the Java SE JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181 7u171 8u162 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE JRockit executes to compromise Java SE JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE JRockit attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets such as through a web service.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows Server 2008
  • Microsoft Windows 7
  • Microsoft Windows Server 2012
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows 8
  • Microsoft Windows Server 2016
  • Microsoft Windows 8.1
  • Microsoft Windows 10
  • Microsoft Windows Server 2012 R2
Class:
vulnerability
Reference(s):
  • CVE-2018-2794
Product(s):
  • JRockit
  • Java Runtime Environment 7
  • Java Runtime Environment 6
  • Java Development Kit 6
  • Java Runtime Environment 8
  • Java Development Kit 7
  • Java Development Kit 10
  • Java Runtime Environment 10
  • Java Development Kit 8