CVE-2022-3676

medium

Description

In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type.

References

https://github.com/eclipse/omr/pull/6773

https://gitlab.eclipse.org/eclipsefdn/emo-team/emo/-/issues/389

https://github.com/eclipse-openj9/openj9/pull/16122

Details

Source: MITRE

Published: 2022-10-24

Updated: 2022-10-25

Type: CWE-843

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Impact Score: 2.5

Exploitability Score: 3.9

Severity: MEDIUM