First published: Thu Aug 16 2018(Updated: )
The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Sdk | =6.0 | |
Ibm Sdk | =7.0 | |
Ibm Sdk | =8.0 | |
Redhat Satellite | =5.6 | |
Redhat Satellite | =5.7 | |
Redhat Satellite | =5.8 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Oracle Enterprise Manager Base Platform | =13.2.0.0.0 | |
Oracle Enterprise Manager Base Platform | =13.3.0.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-1656.
The severity of CVE-2018-1656 is high with a CVSS score of 6.5.
IBM SDK Java Technology Edition 6.0, 7.0, and 8.0, as well as Redhat Satellite 5.6, 5.7, 5.8, Redhat Enterprise Linux Desktop 6.0, 7.0, Redhat Enterprise Linux Server 6.0, 7.0, Redhat Enterprise Linux Workstation 6.0, 7.0, Oracle Enterprise Manager Base Platform 13.2.0.0.0, and 13.3.0.0.0 are affected.
CVE-2018-1656 allows path traversal attacks when extracting compressed dump files in the IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0).
To fix the vulnerability CVE-2018-1656, update your IBM SDK Java Technology Edition to a version that includes the necessary security patches.