F5 Networks BIG-IP : Oracle Java SE vulnerability (K15217245)

Medium Nessus Plugin ID 118632

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: Serialization). Supported versions that
are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE
Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability
allows unauthenticated attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
attacks of this vulnerability can result in unauthorized ability to
cause a partial denial of service (partial DOS) of Java SE, Java SE
Embedded, JRockit. Note: Applies to client and server deployment of
Java. This vulnerability can be exploited through sandboxed Java Web
Start applications and sandboxed Java applets. It can also be
exploited by supplying data to APIs in the specified Component without
using sandboxed Java Web Start applications or sandboxed Java applets,
such as through a web service. CVSS 3.0 Base Score 5.3 (Availability
impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
(CVE-2018-2815)

Impact

BIG-IP / BIG-IQ / F5 iWorkflow / Enterprise Manager / Traffix SDC

An attacker may cause a partial denial of service (DoS) to the
affected Java component when the vulnerability is exploited.

LineRate

There is no impact; thisF5 product is not affected by this
vulnerability.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5
Solution K15217245.

See Also

https://support.f5.com/csp/article/K15217245

Plugin Details

Severity: Medium

ID: 118632

File Name: f5_bigip_SOL15217245.nasl

Version: 1.3

Type: local

Published: 2018/11/02

Modified: 2019/01/04

Dependencies: 76940

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3.0

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip

Patch Publication Date: 2018/05/11

Reference Information

CVE: CVE-2018-2815