CVE-2018-1656
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
20/08/2018
Last modified:
09/10/2019
Description
The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:ibm:sdk:6.0:*:*:*:java_technology:*:*:* | ||
cpe:2.3:a:ibm:sdk:7.0:*:*:*:java_technology:*:*:* | ||
cpe:2.3:a:ibm:sdk:8.0:*:*:*:java_technology:*:*:* | ||
cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.ibm.com/support/docview.wss?uid=ibm10719653
- http://www.securityfocus.com/bid/105118
- http://www.securitytracker.com/id/1041765
- https://access.redhat.com/errata/RHSA-2018:2568
- https://access.redhat.com/errata/RHSA-2018:2569
- https://access.redhat.com/errata/RHSA-2018:2575
- https://access.redhat.com/errata/RHSA-2018:2576
- https://access.redhat.com/errata/RHSA-2018:2712
- https://access.redhat.com/errata/RHSA-2018:2713
- https://exchange.xforce.ibmcloud.com/vulnerabilities/144882
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html