Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
SEVERITY: Medium
CATEGORY: Vulnerability
ANALYSIS SUMMARY
This vulnerability has previously been reported and is now being updated. Oracle Java SE, Java SE Embedded and JRockit are prone to a remote security vulnerability, which can be exploited over multiple protocols. This issue affects the ‘JNDI’ component. This vulnerability affects the following supported versions: Java SE: 6u201, 7u191, 8u182, 11; Java SE Embedded: 8u181; JRockit: R28.3.19. The vulnerability does not require authentication to be exploited. However, It is hard to exploit and several special conditions must be satisfied to exploit it.
This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs.
IMPACT
Information Disclosure, Data modification, Reduced performance
AFFECTED PRODUCTS
REMEDIATION
Updates are available. Follow vendor advisory for further details.
http://aix.software.ibm.com/aix/efixes/security/java_oct2018_advisory.asc https://developer.ibm.com/javasdk/support/security-vulnerabilities/#Oracle_October_16_2018_CPU
Or update to a non-vulnerable version. Following products are not affected.
IBM Java 8.0.5.25
IBM Java 7.1.4.35
IBM Java 7.0.10.35
IBM Java 6.1.8.75
IBM Java 6.0.16.75