Vulnerability Name: | CVE-2015-3149 (CCN-130658) |
Assigned: | 2014-04-20 |
Published: | 2014-04-20 |
Updated: | 2023-02-13 |
Summary: | The Hotspot component in OpenJDK8 as packaged in Red Hat Enterprise Linux 6 and 7 allows local users to write to arbitrary files via a symlink attack. |
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): High Availibility (A): None | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L) 3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 2.6 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): Partial | 3.3 Low (REDHAT CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-377
|
Vulnerability Consequences: | File Manipulation |
References: | Source: MITRE Type: CNA CVE-2015-3149
Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com
Source: CCN Type: Red Hat Bugzilla Bug 1213365 (CVE-2015-3149) CVE-2015-3149 OpenJDK8: insecure hsperfdata temporary file handling, CVE-2015-0383 regression (Hotspot)
Source: secalert@redhat.com Type: Issue Tracking, Vendor Advisory secalert@redhat.com
Source: XF Type: UNKNOWN redhat-cve20153149-symlink(130658)
Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-3149
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*Configuration RedHat 6: cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*Configuration RedHat 7: cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*Configuration RedHat 8: cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*Configuration RedHat 9: cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*Configuration RedHat 10: cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:* Configuration CCN 1: cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |