First published: Thu Aug 16 2018(Updated: )
The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM SDK, Java Technology Edition | =6.0 | |
IBM SDK, Java Technology Edition | =7.0 | |
IBM SDK, Java Technology Edition | =8.0 | |
Red Hat Satellite | =5.6 | |
Red Hat Satellite | =5.7 | |
Red Hat Satellite | =5.8 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Oracle Enterprise Manager | =13.2.0.0.0 | |
Oracle Enterprise Manager | =13.3.0.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-1656.
The severity of CVE-2018-1656 is high with a CVSS score of 6.5.
IBM SDK Java Technology Edition 6.0, 7.0, and 8.0, as well as Redhat Satellite 5.6, 5.7, 5.8, Redhat Enterprise Linux Desktop 6.0, 7.0, Redhat Enterprise Linux Server 6.0, 7.0, Redhat Enterprise Linux Workstation 6.0, 7.0, Oracle Enterprise Manager Base Platform 13.2.0.0.0, and 13.3.0.0.0 are affected.
CVE-2018-1656 allows path traversal attacks when extracting compressed dump files in the IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0).
To fix the vulnerability CVE-2018-1656, update your IBM SDK Java Technology Edition to a version that includes the necessary security patches.