Vulnerability Details : CVE-2018-12539
In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no.
Products affected by CVE-2018-12539
- cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:eclipse:openj9:0.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-12539
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 11 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-12539
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2018-12539
-
The product uses a primary channel for administration or restricted functionality, but it does not properly protect the channel.Assigned by: emo@eclipse.org (Secondary)
-
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-12539
-
https://access.redhat.com/errata/RHSA-2018:2575
RHSA-2018:2575 - Security Advisory - Red Hat Customer PortalNot Applicable;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2712
RHSA-2018:2712 - Security Advisory - Red Hat Customer PortalNot Applicable;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2569
RHSA-2018:2569 - Security Advisory - Red Hat Customer PortalNot Applicable;Third Party Advisory
-
http://www.securityfocus.com/bid/105126
Eclipse OpenJ9 CVE-2018-12539 Multiple Privilege Escalation VulnerabilitiesThird Party Advisory;VDB Entry
-
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Oracle Critical Patch Update - April 2019Patch;Third Party Advisory
-
http://www.securitytracker.com/id/1041765
IBM SPSS Statistics Bugs in Java Components Let Remote Users Modify Files and Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2018:2713
RHSA-2018:2713 - Security Advisory - Red Hat Customer PortalNot Applicable;Third Party Advisory
-
https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589
534589 – (CVE-2018-12539) OpenJ9 VulnerabilitiesIssue Tracking;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2568
RHSA-2018:2568 - Security Advisory - Red Hat Customer PortalNot Applicable;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2576
RHSA-2018:2576 - Security Advisory - Red Hat Customer PortalNot Applicable;Third Party Advisory
Jump to