First published: Tue Jan 16 2018(Updated: )
It was discovered that the LDAPCertStore class in the JNDI component of OpenJDK failed to securely handle LDAP referrals. An attacker could possibly use this flaw to make the LDAPCertStore fetch attacker-controlled certificate data.
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-8 | 8u442-ga-2 | |
Oracle JDK 6 | =1.6.0-update171 | |
Oracle JDK 6 | =1.7.0-update161 | |
Oracle JDK 6 | =1.8.0-update152 | |
Oracle JDK 6 | =9.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update171 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update161 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update152 | |
Oracle Java Runtime Environment (JRE) | =9.0.1 | |
BEA JRockit | =r28.3.16 | |
redhat satellite | =5.6 | |
redhat satellite | =5.7 | |
redhat satellite | =5.8 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.4 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Schneider Electric EcoStruxure Data Center Expert | <7.6.0 | |
HP P9000 Command View Advanced Edition Software | >=8.6.2-01 | |
HP XP P9000 Command View | >=8.6.2-01 | |
HP P9000 Command View Advanced Edition Software | >=8.6.2-01 | |
Oracle JDK 6 | =1.9.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-2633 is high with a CVSS score of 8.3.
The affected versions of Java SE are 6u171, 7u161, 8u152, and 9.0.1.
CVE-2018-2633 can be exploited by an unauthenticated attacker, but it is difficult to exploit.
To fix CVE-2018-2633, update to OpenJDK version 8u382-ga-2 for Debian, or follow the remediation steps provided by your Linux distribution or Oracle.
You can find more information about CVE-2018-2633 on the Oracle website, as well as security advisories and trackers.