Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Oracle Java SE Embedded 8.x was found vulnerable to multiple issues which can be exploited to cause Denial of Service, data manipulation and information disclosure.
IMPACT: NORMAL
PUBLISH DATE: 17-10-2018
OVERVIEW
Multiple vulnerabilities have been reported in Oracle Java SE Embedded. Local users with malicious intent can exploit these vulnerabilities to reveal sensitive information or manipulate data, cause a Denial of Service or compromise a vulnerable system.
Updates have been released by the vendor that fix the vulnerabilities.
ANALYSIS
Following CVE numbers have been assigned to the vulnerabilities found in Oracle Java SE Embedded. However, most of these have not been defined in details.
CVE-2018-3211
CVE-2018-3169
CVE-2018-3214
CVE-2018-3136
CVE-2018-3139
CVE-2018-3180
CVE-2018-3183
CVE-2018-13785
CVE-2018-3149
CVE-2018-13785
In libpng 1.6.34, row_factor is wrongly calculated in the png_check_chunk_length function (pngrutil.c). This makes it capable of triggering an integer overflow and causing resultant divide-by-zero, while processing a crafted PNG file. This will lead to a denial of service (DoS).
The vendor has released a Critical Patch Update which contains 12 new security fixes for Oracle Java SE, 11 of which were found to be exploitable via remote sources, without being authenticated. An attacker can exploit these over a network without providing user credentials.
AFFECTED PRODUCTS
Oracle Java SE Embedded 8.x
(The vulnerabilities are reported in version 8u181)
UPDATES
Owing to periodic reports of malicious attempts by attackers, Oracle keeps releasing fresh fixes. However, some incidents have been reported in which customers didn’t apply relevant patches on time and attackers were able to successfully exploit the vulnerabilities. Therefore, Oracle strongly recommends that customers only use actively-supported versions and apply Critical Patch Update fixes without delay.
Apply updates:
https://support.oracle.com/rs?type=doc&id=2455624.1
(users may need to login to access this document)