First published: Mon Oct 15 2018(Updated: )
An infinite loop flaw was found in the RIFF (Resource Interchange File Format) file format reader in the Sound component of OpenJDK. A specially crafted RIFF file could cause a Java application to enter an infinite loop while reading the RIFF file.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update201 | |
Oracle JDK | =1.7.0-update191 | |
Oracle JDK | =1.8.0-update182 | |
Oracle JRE | =1.6.0-update201 | |
Oracle JRE | =1.7.0-update191 | |
Oracle JRE | =1.8.0-update182 | |
Oracle JRockit | =r28.3.19 | |
Redhat Satellite | =5.6 | |
Redhat Satellite | =5.7 | |
Redhat Satellite | =5.8 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =7.6 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Hp Xp7 Command View | <8.6.3-00 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-3214.
The severity of CVE-2018-3214 is medium.
Java SE versions 6u201, 7u191, and 8u182 are affected by CVE-2018-3214.
An unauthenticated attacker with network access can easily exploit CVE-2018-3214.
You can find more information about CVE-2018-3214 at the following references: [https://bugs.openjdk.java.net/browse/JDK-8135160], [http://hg.openjdk.java.net/jdk9/jdk9/jdk/rev/420dd4208444], [https://www.modzero.ch/modlog/archives/2018/09/20/java_bugs_with_and_without_fuzzing/index.html].