Vulnerability Details : CVE-2015-1931
IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which allows local users to obtain sensitive information by reading a file.
Products affected by CVE-2015-1931
- cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
- cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
- cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
- cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
- cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
- cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1931
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1931
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2015-1931
-
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1931
-
http://rhn.redhat.com/errata/RHSA-2015-1488.html
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html
[security-announce] SUSE-SU-2015:1509-1: important: Security update for java-1_6_0-ibm - openSUSE Security Announce - openSUSE Mailing ListsMailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1485.html
Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1604.html
RHSA-2015:1604 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1544.html
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg1IV75182
IV75182: FIX SECURITY VULNERABILITY CVE-2015-1931Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1486.html
RHSA-2015:1486 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html
[security-announce] SUSE-SU-2015:1329-1: important: Security update for java-1_7_1-ibm - openSUSE Security Announce - openSUSE Mailing ListsMailing List;Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21962302
Security Bulletin: Multiple vulnerabilities in current releases of the IBM® SDK, Java™ Technology EditionVendor Advisory
Jump to