First published: Thu Jan 18 2018(Updated: )
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java VM. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java VM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java VM. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database | =11.2.0.4 | |
Oracle Database | =12.1.0.2 | |
Oracle Database | =12.2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2680 has been rated as difficult to exploit, but it poses a significant risk of allowing unauthenticated attacker access via network protocols.
To fix CVE-2018-2680, upgrade your Oracle Database Server to a patched version that addresses this vulnerability.
CVE-2018-2680 affects Oracle Database versions 11.2.0.4, 12.1.0.2, and 12.2.0.1.
Yes, CVE-2018-2680 can be exploited remotely by an unauthenticated attacker with network access.
CVE-2018-2680 specifically impacts the Java VM component of Oracle Database Server.