First published: Fri Aug 17 2018(Updated: )
IBM JDK 8 SR5 FP20 (8.0.5.20), 7 R1 SR4 FP30 (7.1.4.30), 7 SR10 FP30 (7.0.10.30), and 6 SR16 FP70 (6.0.16.70) fix a flaw described by upstream as: Eclipse OpenJ9 could allow a local attacker to gain elevated privileges on the system, caused by the failure to restrict the use of Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations to only the process owner. An attacker could exploit this vulnerability to execute untrusted native code and gain elevated privileges on the system. References: <a href="https://www-01.ibm.com/support/docview.wss?uid=ibm10719653">https://www-01.ibm.com/support/docview.wss?uid=ibm10719653</a> <a href="https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018">https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018</a> More details can be found in the Eclipse bugzilla: <a href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589#c3">https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589#c3</a>
Affected Software | Affected Version | How to fix |
---|---|---|
IBM JDK 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1618767 is categorized as high due to the potential for a local attacker to gain elevated privileges.
To fix REDHAT-BUG-1618767, upgrade to the latest patched versions of IBM JDK as specified in the update documentation.
The affected versions of IBM JDK include 8 SR5 FP20, 7 R1 SR4 FP30, 7 SR10 FP30, and 6 SR16 FP70.
REDHAT-BUG-1618767 is caused by a failure to restrict the use of the Java Attach API, potentially allowing privilege escalation.
No, the REDHAT-BUG-1618767 vulnerability requires local access to the system to be exploited.