First published: Wed Oct 24 2018(Updated: )
Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Modules-Java8 that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jackson-modules-java8 | <2.9.8 | 2.9.8 |
Fasterxml Jackson Modules Java8 | <2.9.8 | |
Oracle Clusterware | =12.1.0.2.0 | |
Oracle Database | =12.1.0.2 | |
Oracle Database | =12.2.0.1 | |
Oracle Database | =18c | |
Oracle Database | =19c | |
Oracle Global Lifecycle Management OPatch | <11.2.0.3.23 | |
Oracle Global Lifecycle Management OPatch | >=12.2.0.1.0<12.2.0.1.19 | |
Oracle Global Lifecycle Management OPatch | >=13.9.4.0.0<13.9.4.2.1 | |
Oracle NoSQL Database | <19.3.12 | |
NetApp Active IQ Unified Manager | >=7.3 | |
NetApp Active IQ Unified Manager | >=7.3 | |
NetApp Active IQ Unified Manager for VMware vSphere | >=9.5 | |
IBM Global Data Engine | <=3.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-1000873.
The severity of CVE-2018-1000873 is medium with a severity value of 6.5.
FasterXML jackson-databind versions before 2.9.8 are affected by CVE-2018-1000873.
CVE-2018-1000873 is a CWE-20: Improper Input Validation vulnerability.
CVE-2018-1000873 can be exploited by deserializing malicious input, specifically very large values.