SB2017112709 - Red Hat update for java-1.8.0-ibm
Published: November 27, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 15 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2016-10165)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The weakness exists due to a flaw in the 2D (Little CMS 2) component. A remote attacker can read arbitrary files on the target system.
2) Denial of service (CVE-ID: CVE-2017-10281)
The vulnerability allows a remote attacker to cause DoS condition.The weakness exists due to a flaw in the Serialization component. A remote attacker can trigger partial denial of service on the target system.
3) Privilege escalation (CVE-ID: CVE-2017-10285)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists due to a flaw in the RMI component. A remote attacker can escalate his privileges on the target system.
4) Improper access control (CVE-ID: CVE-2017-10295)
The vulnerability allows a remote attacker to access potentially sensitive information.The weakness exists due to a flaw in the Javadoc component. A remote attacker can partially modify arbitrary files on the target system.
5) Improper access control (CVE-ID: CVE-2017-10309)
The vulnerability allows a remote attacker to access potentially sensitive information and cause DoS condition.The weakness exists due to a flaw in the Deployment component. A remote attacker can partially read and modify arbitrary files and cause partial denial of service on the target system.
6) Improper access control (CVE-ID: CVE-2017-10345)
The vulnerability allows a remote attacker to cause DoS condition.The weakness exists due to a flaw in the Serialization component. A remote attacker can trigger partial denial of service.
7) Privilege escalation (CVE-ID: CVE-2017-10346)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists due to a flaw in the Hotspot component. A remote attacker can escalate his privileges on the target system.
8) Denial of service (CVE-ID: CVE-2017-10347)
The vulnerability allows a remote attacker to cause DoS condition.The weakness exists due to a flaw in the Serialization component. A remote attacker can trigger partial denial of service on the target system.
9) Improper access control (CVE-ID: CVE-2017-10348)
The vulnerability allows a remote attacker to cause DoS condition.The weakness exists due to a flaw in the Libraries component. A remote attacker can trigger partial denial of service.
10) Improper access control (CVE-ID: CVE-2017-10349)
The vulnerability allows a remote attacker to cause DoS condition.The weakness exists due to a flaw in the JAXP component. A remote attacker can trigger partial denial of service.
11) Improper access control (CVE-ID: CVE-2017-10350)
The vulnerability allows a remote attacker to cause DoS condition.The weakness exists due to a flaw in the JAX-WS component. A remote attacker can trigger partial denial of service.
12) Improper access control (CVE-ID: CVE-2017-10355)
The vulnerability allows a remote attacker to cause DoS condition.The weakness exists due to a flaw in the Networking component. A remote attacker can trigger partial denial of service.
13) Improper access control (CVE-ID: CVE-2017-10356)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.The weakness exists due to a flaw in the Security component. A remote attacker can gain unauthorized access to sensitive information.
14) Improper access control (CVE-ID: CVE-2017-10357)
The vulnerability allows a remote attacker to cause DoS condition.The weakness exists due to a flaw in the Serialization component. A remote attacker can trigger partial denial of service.
15) Privilege escalation (CVE-ID: CVE-2017-10388)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists due to a flaw in the Libraries component. A remote attacker can escalate his privileges on the target system.
Remediation
Install update from vendor's website.