Oracle Java SE Embedded 8.x was found vulnerable to multiple issues which can be exploited to cause Denial of Service, data manipulation and information disclosure.
PUBLISH DATE: 17-10-2018
Multiple vulnerabilities have been reported in Oracle Java SE Embedded. Local users with malicious intent can exploit these vulnerabilities to reveal sensitive information or manipulate data, cause a Denial of Service or compromise a vulnerable system.
Updates have been released by the vendor that fix the vulnerabilities.
Following CVE numbers have been assigned to the vulnerabilities found in Oracle Java SE Embedded. However, most of these have not been defined in details.
In libpng 1.6.34, row_factor is wrongly calculated in the png_check_chunk_length function (pngrutil.c). This makes it capable of triggering an integer overflow and causing resultant divide-by-zero, while processing a crafted PNG file. This will lead to a denial of service (DoS).
The vendor has released a Critical Patch Update which contains 12 new security fixes for Oracle Java SE, 11 of which were found to be exploitable via remote sources, without being authenticated. An attacker can exploit these over a network without providing user credentials.
Oracle Java SE Embedded 8.x
(The vulnerabilities are reported in version 8u181)
Owing to periodic reports of malicious attempts by attackers, Oracle keeps releasing fresh fixes. However, some incidents have been reported in which customers didn’t apply relevant patches on time and attackers were able to successfully exploit the vulnerabilities. Therefore, Oracle strongly recommends that customers only use actively-supported versions and apply Critical Patch Update fixes without delay.
(users may need to login to access this document)