Security restrictions bypass in Oracle products - CVE-2018-2798

 

Security restrictions bypass in Oracle products - CVE-2018-2798

Published: April 19, 2018


Vulnerability identifier: #VU11952
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-2798
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Oracle
Affected software:
Oracle Java SE
Java SE Embedded
JRockit

Detailed vulnerability description

The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.

The weakness exists in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE due to improper security restrictions. A remote attacker can partially cause the service to crash.

How to mitigate CVE-2018-2798

Install update from vendor's website.

Sources