First published: Fri Aug 17 2018(Updated: )
IBM JDK 8 SR5 FP20 (8.0.5.20), 7 R1 SR4 FP30 (7.1.4.30), 7 SR10 FP30 (7.0.10.30), and 6 SR16 FP70 (6.0.16.70) fix a flaw described by upstream as: A flaw in the java.math component in IBM SDK, Java Technology Edition may allow an attacker to inflict a denial-of-service attack with specially crafted String data. References: <a href="https://www-01.ibm.com/support/docview.wss?uid=ibm10719653">https://www-01.ibm.com/support/docview.wss?uid=ibm10719653</a> <a href="https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018">https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018</a>
Affected Software | Affected Version | How to fix |
---|---|---|
IBM JDK | ||
IBM JDK 7 | ||
IBM JDK | ||
IBM JDK 6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1618871 is considered high due to the potential for denial-of-service attacks.
To fix REDHAT-BUG-1618871, upgrade to the patched versions of IBM JDK provided in the security update.
The affected products for REDHAT-BUG-1618871 include IBM JDK 8, 7 R1, 7, and 6 in specific fix pack versions.
REDHAT-BUG-1618871 allows an attacker to conduct a denial-of-service attack through specially crafted inputs.
Currently, there are no documented workarounds for REDHAT-BUG-1618871; the recommended solution is to apply the update.