Multiple vulnerabilities in Oracle Java Advanced Management Console



Published: 2017-10-17 | Updated: 2017-10-20
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2017-10380
CVE-2017-10386
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Java Advanced Management Console
Client/Desktop applications / Other client software

Vendor Oracle

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU8879

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2017-10380

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to access potentially sensitive information.

The weakness exists due to a flaw in the Server component. A remote attacker can partially read and modify arbitrary files on the target system.

Mitigation

The vulnerability is addressed in the following version: 8u151.

Vulnerable software versions

Java Advanced Management Console: 2.7 - 2.7

CPE2.3 External links

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Improper access control

EUVDB-ID: #VU8880

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2017-10386

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to access potentially sensitive information.

The weakness exists due to a flaw in the Server component. A remote attacker can partially read and modify arbitrary files on the target system.

Mitigation

The vulnerability is addressed in the following version: 8u151.

Vulnerable software versions

Java Advanced Management Console: 2.7 - 2.7

CPE2.3 External links

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###