Risk | Low |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2024-21002 CVE-2024-21003 CVE-2024-21004 CVE-2024-21005 CVE-2024-21011 CVE-2024-21068 CVE-2024-21085 CVE-2024-21094 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU88672
Risk: Low
CVSSv3.1: 2.2 [CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-21002
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the JavaFX component in Oracle GraalVM Enterprise Edition. A local non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.aarch64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.aarch64
src:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.src
x86_64:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.x86_64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/AL2023/ALAS-2024-602.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88670
Risk: Low
CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-21003
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the JavaFX component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.aarch64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.aarch64
src:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.src
x86_64:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.x86_64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/AL2023/ALAS-2024-602.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88673
Risk: Low
CVSSv3.1: 2.2 [CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-21004
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the JavaFX component in Oracle GraalVM Enterprise Edition. A local non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.aarch64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.aarch64
src:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.src
x86_64:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.x86_64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/AL2023/ALAS-2024-602.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88671
Risk: Low
CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-21005
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the JavaFX component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.aarch64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.aarch64
src:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.src
x86_64:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.x86_64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/AL2023/ALAS-2024-602.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88666
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-21011
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.aarch64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.aarch64
src:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.src
x86_64:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.x86_64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/AL2023/ALAS-2024-602.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88667
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-21068
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.aarch64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.aarch64
src:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.src
x86_64:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.x86_64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/AL2023/ALAS-2024-602.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88665
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-21085
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Concurrency component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.aarch64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.aarch64
src:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.src
x86_64:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.x86_64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/AL2023/ALAS-2024-602.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88668
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-21094
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.aarch64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.aarch64
src:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.src
x86_64:
java-1.8.0-amazon-corretto-1.8.0_412.b08-1.amzn2023.x86_64
java-1.8.0-amazon-corretto-devel-1.8.0_412.b08-1.amzn2023.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/AL2023/ALAS-2024-602.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.