First published: Tue Oct 16 2018(Updated: )
It was discovered that the JNDI comment of OpenJDK did not properly enforce the restriction controlled by the com.sun.jndi.ldap.object.trustURLCodebase system property. In certain cases, a Java LDAP client could unexpectedly load and execute code form an LDAP server.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.25+9-1~deb11u1 11.0.26+4-1 | |
debian/openjdk-8 | 8u432-b06-2 | |
Oracle JDK 6 | =1.6.0-update201 | |
Oracle JDK 6 | =1.7.0-update191 | |
Oracle JDK 6 | =1.8.0-update181 | |
Oracle JDK 6 | =11.0.0 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update201 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update191 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update181 | |
Oracle Java Runtime Environment (JRE) | =11.0.0 | |
BEA JRockit | =r28.3.19 | |
redhat satellite | =5.6 | |
redhat satellite | =5.7 | |
redhat satellite | =5.8 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
hp xp7 command view | <8.6.3-00 | |
hp xp7 command view | =8.6.4-00 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
HP P9000 Command View Advanced Edition Software | <8.6.3-00 | |
HP P9000 Command View Advanced Edition Software | =8.6.4-00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3149 is a vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE that allows an unauthenticated attacker to compromise the confidentiality, integrity, and availability of the affected system.
The affected versions of Java SE are 6u201, 7u191, 8u182, and 11.
The severity of CVE-2018-3149 is high, with a CVSS score of 8.3.
To fix CVE-2018-3149 in Debian, update to openjdk-11 version 11.0.16+8-1~deb10u1, openjdk-8 version 8u382-ga-2, or apply the available patches from the Debian repository.
You can find more information about CVE-2018-3149 at the following references: [1] [2] [3].