SB2017051024 - Red Hat update for java-1.7.1-ibm
Published: May 10, 2017 Updated: February 27, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 18 secuirty vulnerabilities.
1) Denial of service (CVE-ID: CVE-2016-9840)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in zlib due to out-of-bounds pointer arithmetic in inftrees.c. A remote attacker can send a specially crafted document, trick the victim into opening it, and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
2) Denial of service (CVE-ID: CVE-2016-9841)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in zlib due to out-of-bounds pointer arithmetic in inftrees.c. A remote attacker can cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
3) Denial of service (CVE-ID: CVE-2016-9842)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in zlib due to an undefined left shift of negative number. A remote attacker can send a specially crafted document, trick the victim into opening it, and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
4) Denial of service (CVE-ID: CVE-2016-9843)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in zlib due to big-endian out-of-bounds pointer. A remote attacker can send a specially crafted document, trick the victim into opening it, and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
5) Buffer over-read (CVE-ID: CVE-2017-12899)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The weakness exists due to buffer over-read in the DECnet component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.
6) Buffer over-read (CVE-ID: CVE-2017-12898)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The weakness exists due to buffer over-read in the NFS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.
7) Buffer over-read (CVE-ID: CVE-2017-12897)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The weakness exists due to buffer over-read in the ISO CLNS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.
8) Buffer over-read (CVE-ID: CVE-2017-12896)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The weakness exists due to buffer over-read in the ISAKMP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.
9) Buffer over-read (CVE-ID: CVE-2017-12895)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The weakness exists due to buffer over-read in the ICMP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.
10) Buffer over-read (CVE-ID: CVE-2017-12894)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The weakness exists due to buffer over-read in the lookup_bytestring component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.
11) Buffer over-read (CVE-ID: CVE-2017-12893)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The weakness exists due to buffer over-read in the SMB/CIFS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.
12) Insecure DLL loading (CVE-ID: CVE-2017-12892)
The vulnerability allows a remote attacker to gain elevated privileges.The vulnerability exists in the application's installer package due to untrusted search path elemant. A remote attacker can place a specially crafted .dll file on a remote SBM or WebDAV share, trick the victim into opening legitimate media file and execute arbitrary code on the target system with system privileges.
Successful exploitation of the vulnerability may result in system compromise.
13) XML injection (CVE-ID: CVE-2017-1289)
The vulnerability allows a remote attacker to perform XXE attack.The weakness exists due to improper handling of XML External Entity (XXE) entries when parsing an XML data. A remote attacker can supply a specially crafted XML file to disclose important data or consume memory resources.
Successful exploitation of the vulnerability results in information disclosure.
14) Security restrictions bypass (CVE-ID: CVE-2017-3509)
The vulnerability allows a remote attacker to gain access to potentially sensitive information on the target system.The weakness exists due to unknown error. A remote attacker can read and modify arbitrary files.
15) Remote code execution (CVE-ID: CVE-2017-3511)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to unknown error related to the Java SE, Java SE Embedded, JRockit JCE component. A remote attacker can trick the victim into visiting a specially crafted webpage and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
16) Security restrictions bypass (CVE-ID: CVE-2017-3533)
The vulnerability allows a remote attacker to modify information on the target system.The weakness exists due to unknown error related to the Java SE, Java SE Embedded, JRockit Networking component. A remote attacker can access and modify arbitrary data.
17) Security restrictions bypass (CVE-ID: CVE-2017-3539)
The vulnerability allows a remote attacker to modify information on the target system.The weakness exists due to unknown error related to the Java SE, Java SE Embedded Security component. A remote attacker can trick the victim into visiting a specially crafted webpage, access and modify arbitrary data.
18) Security restrictions bypass (CVE-ID: CVE-2017-3544)
The vulnerability allows a remote attacker to modify information on the target system.The weakness exists due to unknown error related to the Java SE, Java SE Embedded Networking component. A remote attacker can access and modify arbitrary data.
Remediation
Install update from vendor's website.