Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
06 Oct 2022, 18:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:* cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:* cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:* cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:* cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:* cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:* |
|
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2712 - Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/3735-1/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2713 - Third Party Advisory | |
References | (CONFIRM) https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2576 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2241 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2255 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:3007 - Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/3747-1/ - Third Party Advisory | |
References | (CONFIRM) https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us - Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2018/dsa-4268 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2569 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2575 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2242 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2254 - Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1041302 - Broken Link | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/3734-1/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2568 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2286 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2256 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20180726-0001/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:3008 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2253 - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/104765 - Broken Link | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2283 - Third Party Advisory | |
First Time |
Redhat
Netapp oncommand Unified Manager Netapp steelstore Cloud Integrated Storage Canonical ubuntu Linux Netapp vasa Provider For Clustered Data Ontap Redhat enterprise Linux Desktop Redhat enterprise Linux Server Tus Redhat satellite Netapp cloud Backup Netapp active Iq Unified Manager Netapp e-series Santricity Os Controller Debian debian Linux Netapp e-series Santricity Storage Manager Netapp virtual Storage Console Hp xp7 Command View Redhat enterprise Linux Eus Canonical Redhat enterprise Linux Server Aus Netapp plug-in For Symantec Netbackup Debian Redhat enterprise Linux Server Netapp snapmanager Netapp oncommand Workflow Automation Hp Netapp oncommand Insight Netapp storage Replication Adapter For Clustered Data Ontap Netapp Redhat enterprise Linux Workstation |
13 May 2022, 14:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:jre:1.7.0:update_181:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_191:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_191:*:*:*:*:*:* |
cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:* |
Information
Published : 2018-07-18 13:29
Updated : 2023-12-10 12:44
NVD link : CVE-2018-2952
Mitre link : CVE-2018-2952
CVE.ORG link : CVE-2018-2952
JSON object : View
Products Affected
netapp
- snapmanager
- cloud_backup
- vasa_provider_for_clustered_data_ontap
- steelstore_cloud_integrated_storage
- virtual_storage_console
- oncommand_unified_manager
- oncommand_workflow_automation
- oncommand_insight
- e-series_santricity_os_controller
- e-series_santricity_storage_manager
- active_iq_unified_manager
- plug-in_for_symantec_netbackup
- storage_replication_adapter_for_clustered_data_ontap
canonical
- ubuntu_linux
redhat
- enterprise_linux_server_aus
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_eus
- enterprise_linux_server_tus
- enterprise_linux_workstation
- satellite
oracle
- jdk
- jre
- jrockit
debian
- debian_linux
hp
- xp7_command_view
CWE