SB2018050208 - Multiple vulnerabilities in IBM AIX
Published: May 2, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 18 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2018-2579)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit Libraries component. A remote attacker can partially access data.
2) Information disclosure (CVE-ID: CVE-2018-2588)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit LDAP component. A remote attacker can partially access data.
3) Denial of service (CVE-ID: CVE-2018-2663)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit Libraries component. A remote attacker can cause partial denial of service conditions.
4) Denial of service (CVE-ID: CVE-2018-2677)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded AWT component. A remote attacker can cause partial denial of service conditions.
5) Denial of service (CVE-ID: CVE-2018-2678)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit JNDI component. A remote attacker can cause partial denial of service conditions.
6) Security restrictions bypass (CVE-ID: CVE-2018-2602)
The vulnerability allows a local attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded I18n component. A local attacker can partially access data, partially modify data, and partially deny service.
7) Security restrictions bypass (CVE-ID: CVE-2018-2599)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit JNDI component. A remote attacker can partially modify data and cause partial denial of service conditions.
8) Security restrictions bypass (CVE-ID: CVE-2018-2603)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit Libraries component. A remote attacker can cause partial denial of service conditions.
9) Denial of service (CVE-ID: CVE-2018-2657)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to a flaw in the Java SE, JRockit Serialization component. A remote attacker can cause partial denial of service conditions.
10) Information disclosure (CVE-ID: CVE-2018-2618)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit JCE component. A remote attacker can access data.
11) Security restrictions bypass (CVE-ID: CVE-2018-2641)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded AWT component. A remote attacker can modify data.
12) Security restrictions bypass (CVE-ID: CVE-2018-2582)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit Libraries component. A remote attacker can modify data.
13) Information disclosure (CVE-ID: CVE-2018-2634)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded JGSS component. A remote attacker can access data.
14) Security restrictions bypass (CVE-ID: CVE-2018-2637)
The vulnerability allows a local attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit JMX component. A remote attacker can access and modify data.
15) Privilege escalation (CVE-ID: CVE-2018-2633)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit JNDI component. A remote attacker can gain system privileges on the target system.
16) Privilege escalation (CVE-ID: CVE-2018-2638)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists due to a flaw in the Java SE Deployment component. A remote attacker can gain system privileges on the target system.
17) Privilege escalation (CVE-ID: CVE-2018-2639)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists due to a flaw in the Java SE Deployment component. A remote attacker can gain system privileges on the target system.
18) Security restrictions bypass (CVE-ID: CVE-2018-1417)
The vulnerability allows a remote attacker to gain elevated privileges on the target system.The weakness exists due to allowing untrusted code running under a security manager. A remote attacker can gain root privileges.
Remediation
Install update from vendor's website.