Rewterz Threat Advisory – Google Chrome Multiple Vulnerabilities
October 17, 2018Rewterz Threat Advisory – Oracle HTTP Server Multiple Vulnerabilities
October 18, 2018Rewterz Threat Advisory – Google Chrome Multiple Vulnerabilities
October 17, 2018Rewterz Threat Advisory – Oracle HTTP Server Multiple Vulnerabilities
October 18, 2018Oracle Java SE Embedded 8.x was found vulnerable to multiple issues which can be exploited to cause Denial of Service, data manipulation and information disclosure.
IMPACT: NORMAL
PUBLISH DATE: 17-10-2018
OVERVIEW
Multiple vulnerabilities have been reported in Oracle Java SE Embedded. Local users with malicious intent can exploit these vulnerabilities to reveal sensitive information or manipulate data, cause a Denial of Service or compromise a vulnerable system.
Updates have been released by the vendor that fix the vulnerabilities.
ANALYSIS
Following CVE numbers have been assigned to the vulnerabilities found in Oracle Java SE Embedded. However, most of these have not been defined in details.
CVE-2018-3211
CVE-2018-3169
CVE-2018-3214
CVE-2018-3136
CVE-2018-3139
CVE-2018-3180
CVE-2018-3183
CVE-2018-13785
CVE-2018-3149
CVE-2018-13785
In libpng 1.6.34, row_factor is wrongly calculated in the png_check_chunk_length function (pngrutil.c). This makes it capable of triggering an integer overflow and causing resultant divide-by-zero, while processing a crafted PNG file. This will lead to a denial of service (DoS).
The vendor has released a Critical Patch Update which contains 12 new security fixes for Oracle Java SE, 11 of which were found to be exploitable via remote sources, without being authenticated. An attacker can exploit these over a network without providing user credentials.
AFFECTED PRODUCTS
Oracle Java SE Embedded 8.x
(The vulnerabilities are reported in version 8u181)
UPDATES
Owing to periodic reports of malicious attempts by attackers, Oracle keeps releasing fresh fixes. However, some incidents have been reported in which customers didn’t apply relevant patches on time and attackers were able to successfully exploit the vulnerabilities. Therefore, Oracle strongly recommends that customers only use actively-supported versions and apply Critical Patch Update fixes without delay.
Apply updates:
https://support.oracle.com/rs?type=doc&id=2455624.1
(users may need to login to access this document)