Vulnerability Name:

CVE-2018-3211 (CCN-151527)

Assigned:2017-12-15
Published:2018-10-16
Updated:2022-06-27
Summary:Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serviceability). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data.
Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). This vulnerability can only be exploited when Java Usage Tracker functionality is being used. CVSS 3.0 Base Score 6.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N).
CVSS v3 Severity:6.6 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)
5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
6.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
6.6 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)
5.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:3.3 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
6.2 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Other
References:Source: MITRE
Type: CNA
CVE-2018-3211

Source: CCN
Type: Oracle CPUOct2018
Oracle Critical Patch Update Advisory - October 2018

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

Source: BID
Type: Broken Link
105591

Source: CCN
Type: BID-105591
Oracle Java SE/Java SE Embedded CVE-2018-3211 Local Security Vulnerability

Source: SECTRACK
Type: Broken Link
1041889

Source: REDHAT
Type: Third Party Advisory
RHSA-2018:3002

Source: REDHAT
Type: Third Party Advisory
RHSA-2018:3003

Source: XF
Type: UNKNOWN
oracle-cpuoct2018-cve20183211(151527)

Source: GENTOO
Type: Third Party Advisory
GLSA-201908-10

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20181018-0001/

Source: CCN
Type: ZDI-18-1263
Oracle Java Usage Tracker usagetracker.properties Privilege Escalation Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:oracle:jdk:11.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:11.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jdk:1.8.0:update181:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.8.0:update181:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:rhel_extras_oracle_java:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:rhel_extras_oracle_java:6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20183003
    P
    RHSA-2018:3003: java-1.8.0-oracle security update (Critical)
    2018-10-24
    oval:com.redhat.rhsa:def:20183002
    P
    RHSA-2018:3002: java-1.8.0-oracle security update (Critical)
    2018-10-24
    oval:com.ubuntu.bionic:def:20183211000
    V
    CVE-2018-3211 on Ubuntu 18.04 LTS (bionic) - medium.
    2018-10-16
    oval:com.ubuntu.bionic:def:201832110000000
    V
    CVE-2018-3211 on Ubuntu 18.04 LTS (bionic) - medium.
    2018-10-16
    oval:com.ubuntu.cosmic:def:20183211000
    V
    CVE-2018-3211 on Ubuntu 18.10 (cosmic) - medium.
    2018-10-16
    oval:com.ubuntu.xenial:def:201832110000000
    V
    CVE-2018-3211 on Ubuntu 16.04 LTS (xenial) - medium.
    2018-10-16
    oval:com.ubuntu.xenial:def:20183211000
    V
    CVE-2018-3211 on Ubuntu 16.04 LTS (xenial) - medium.
    2018-10-16
    oval:com.ubuntu.cosmic:def:201832110000000
    V
    CVE-2018-3211 on Ubuntu 18.10 (cosmic) - medium.
    2018-10-16
    BACK
    oracle jdk 11.0.0
    oracle jre 11.0.0
    oracle jdk 1.8.0 update181
    oracle jre 1.8.0 update181