CVE-2016-0264

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Buffer overflow in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) allows remote attackers to execute arbitrary code via unspecified vectors.

References

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html

http://rhn.redhat.com/errata/RHSA-2016-0702.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html

http://rhn.redhat.com/errata/RHSA-2016-0701.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html

http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035

http://www-01.ibm.com/support/docview.wss?uid=swg21980826

http://rhn.redhat.com/errata/RHSA-2016-0708.html

http://rhn.redhat.com/errata/RHSA-2016-0716.html

https://access.redhat.com/errata/RHSA-2016:1430

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html

http://www.securitytracker.com/id/1035953

http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html

http://rhn.redhat.com/errata/RHSA-2016-1039.html

https://access.redhat.com/errata/RHSA-2017:1216

Details

Source: MITRE

Published: 2016-05-24

Updated: 2021-09-09

Type: CWE-119

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 5.6

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Impact Score: 3.4

Exploitability Score: 2.2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*

cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*

cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*

cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*

cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*

Configuration 3

OR

cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*

Configuration 5

OR

cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*

cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*

cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
119977SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2016:1303-1)NessusSuSE Local Security Checks
critical
100094RHEL 6 : java-1.7.1-ibm (RHSA-2017:1216)NessusRed Hat Local Security Checks
critical
93049IBM WebSphere MQ 7.1 < 7.1.0.8 / 7.5 < 7.5.0.7 / 8.0 < 8.0.0.5 Multiple VulnerabilitiesNessusWindows
critical
92400RHEL 5 / 6 : java-1.7.0-ibm and java-1.7.1-ibm (RHSA-2016:1430) (SLOTH)NessusRed Hat Local Security Checks
critical
91319SUSE SLES10 Security Update : IBM Java 1.6.0 (SUSE-SU-2016:1388-1)NessusSuSE Local Security Checks
critical
91309SUSE SLES11 Security Update : java-1_6_0-ibm (SUSE-SU-2016:1379-1)NessusSuSE Local Security Checks
critical
91308SUSE SLES11 Security Update : java-1_7_0-ibm (SUSE-SU-2016:1378-1)NessusSuSE Local Security Checks
critical
91161SUSE SLES11 Security Update : java-1_7_1-ibm (SUSE-SU-2016:1300-1)NessusSuSE Local Security Checks
critical
91160SUSE SLES12 Security Update : java-1_7_1-ibm (SUSE-SU-2016:1299-1)NessusSuSE Local Security Checks
critical
91103AIX Java Advisory : java_april2016_advisory.asc (April 2016 CPU)NessusAIX Local Security Checks
critical
91079RHEL 6 : java-1.8.0-ibm (RHSA-2016:1039)NessusRed Hat Local Security Checks
critical
90882RHEL 7 : java-1.8.0-ibm (RHSA-2016:0716)NessusRed Hat Local Security Checks
critical
90853RHEL 5 / 6 : java-1.6.0-ibm (RHSA-2016:0708)NessusRed Hat Local Security Checks
critical
90819RHEL 5 : java-1.7.0-ibm (RHSA-2016:0702)NessusRed Hat Local Security Checks
critical
90818RHEL 6 / 7 : java-1.7.1-ibm (RHSA-2016:0701)NessusRed Hat Local Security Checks
critical