Oracle GraalVM 输入验证错误漏洞

admin 2023-11-30 19:12:48 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 Oracle GraalVM 输入验证错误漏洞

CVE编号

CVE-2021-35586

利用情况

暂无

补丁情况

官方补丁

披露时间

2021-10-21
漏洞描述
Oracle GraalVM是美国甲骨文(Oracle)公司的一套使用Java语言编写的即时编译器。该产品支持多种编程语言和执行模式。 Oracle Java SE 的 Oracle GraalVM Enterprise Edition(组件:ImageIO)存在输入验证错误漏洞,该漏洞允许未经身份验证的攻击者通过多种协议访问网络,从而破坏 Oracle GraalVM Enterprise Edition。成功攻击此漏洞可导致拒绝服务。
解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://www.oracle.com/security-alerts/cpuoct2021.html
参考链接
https://access.redhat.com/security/cve/cve-2021-35586
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://packetstormsecurity.com/files/164568/Red-Hat-Security-Advisory-2021-3...
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://www.cybersecurity-help.cz/vdb/SB2021102108
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 netapp e-series_santricity_os_controller * From (including) 11.0.0 Up to (including) 11.70.1
运行在以下环境
应用 netapp e-series_santricity_storage_manager - -
运行在以下环境
应用 netapp e-series_santricity_web_services - -
运行在以下环境
应用 netapp hci_management_node - -
运行在以下环境
应用 netapp oncommand_insight - -
运行在以下环境
应用 netapp santricity_unified_manager - -
运行在以下环境
应用 netapp solidfire - -
运行在以下环境
应用 oracle graalvm 20.3.3 -
运行在以下环境
应用 oracle graalvm 21.2.0 -
运行在以下环境
应用 oracle openjdk 11.0.12 -
运行在以下环境
应用 oracle openjdk 17 -
运行在以下环境
应用 oracle openjdk 7 -
运行在以下环境
应用 oracle openjdk 8 -
运行在以下环境
系统 alibaba_cloud_linux_2.1903 java-11-openjdk-src * Up to (excluding) 1.8.0.312.b07-1.1.al7
运行在以下环境
系统 alpine_3.14 openjdk11 * Up to (excluding) 11.0.14_p9-r0
运行在以下环境
系统 alpine_3.15 openjdk11 * Up to (excluding) 17.0.1_p12-r0
运行在以下环境
系统 alpine_3.16 openjdk11 * Up to (excluding) 17.0.1_p12-r0
运行在以下环境
系统 alpine_3.17 openjdk11 * Up to (excluding) 17.0.1_p12-r0
运行在以下环境
系统 alpine_3.18 openjdk11 * Up to (excluding) 17.0.1_p12-r0
运行在以下环境
系统 alpine_edge openjdk11 * Up to (excluding) 17.0.1_p12-r0
运行在以下环境
系统 amazon_2 java-1.8.0-openjdk * Up to (excluding) 11.0.13+8-1.amzn2
运行在以下环境
系统 amazon_AMI java-1.8.0-openjdk * Up to (excluding) 1.8.0-openjdk-1.8.0.312.b07-0.65.amzn1
运行在以下环境
系统 anolis_os_8 java-1.8.0-openjdk-accessibility * Up to (excluding) 11.0.13.0.8-1
运行在以下环境
系统 anolis_os_8.2 java-1.8.0-openjdk-demo * Up to (excluding) 11.0.13.0.8-1
运行在以下环境
系统 centos_7 java * Up to (excluding) 1.8.0.312.b07-1.el7_9
运行在以下环境
系统 centos_8 java-1.8.0-ibm-src * Up to (excluding) 1.8.0.312.b07-1.el8_4
运行在以下环境
系统 debian_10 openjdk-11 * Up to (excluding) 11.0.13+8-1~deb10u1
运行在以下环境
系统 debian_11 openjdk-11 * Up to (excluding) 11.0.13+8-1~deb11u1
运行在以下环境
系统 debian_12 openjdk-17 * Up to (excluding) 17.0.1+12-1
运行在以下环境
系统 debian_9 openjdk-8 * Up to (excluding) 8u312-b07-1~deb9u1
运行在以下环境
系统 debian_sid openjdk-11 * Up to (excluding) 11.0.13+8-1
运行在以下环境
系统 fedora_33 java-11-openjdk-demo-slowdebug * Up to (excluding) 1.8.0.312.b07-1.fc33
运行在以下环境
系统 fedora_34 java-11-openjdk-demo-slowdebug * Up to (excluding) 1.8.0.312.b07-1.fc34
运行在以下环境
系统 fedora_35 java-11-openjdk-demo-slowdebug * Up to (excluding) 1.8.0.312.b07-1.fc35
运行在以下环境
系统 fedora_EPEL_7 java-latest-openjdk-javadoc * Up to (excluding) 17.0.1.0.12-1.rolling.el7
运行在以下环境
系统 fedora_EPEL_8 java-latest-openjdk-headless-slowdebug-debuginfo * Up to (excluding) 17.0.1.0.12-3.rolling.el8
运行在以下环境
系统 kylinos_aarch64_V10 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP1 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP3 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP3 java-11-openjdk * Up to (excluding) 11.0.17.0.8-11.3.0.a.ky10
运行在以下环境
系统 kylinos_x86_64_V10 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP1 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP3 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 opensuse_Leap_15.2 java-1_8_0-openj9-devel * Up to (excluding) 11.0.13.0-lp152.2.21.2
运行在以下环境
系统 opensuse_Leap_15.3 java-1_8_0-openj9-devel * Up to (excluding) 2.53.11.1-lp153.17.5.1
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 1.8.0.312.b07-1.el7_9
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 11.0.13.0.8-1.el8_4
运行在以下环境
系统 redhat_7 java-1.8.0-openjdk * Up to (excluding) 1.7.1-ibm-1.7.1.5.0-1jpp.1.el7
运行在以下环境
系统 redhat_8 java-1.8.0-ibm-src * Up to (excluding) 1.8.0.312.b07-1.el8_4
运行在以下环境
系统 suse_12_SP5 java-1_8_0-ibm-alsa * Up to (excluding) 1.7.1_sr5.0-38.65.1
运行在以下环境
系统 ubuntu_18.04 openjdk-lts * Up to (excluding) 8u312-b07-0ubuntu1~18.04
运行在以下环境
系统 ubuntu_20.04 openjdk-lts * Up to (excluding) 11.0.13+8-0ubuntu1~20.04
运行在以下环境
系统 ubuntu_21.04 openjdk-lts * Up to (excluding) 8u312-b07-0ubuntu1~21.04
运行在以下环境
系统 ubuntu_21.10 openjdk-lts * Up to (excluding) 11.0.13+8-0ubuntu1~21.10
运行在以下环境
系统 unionos_d openjdk-11 * Up to (excluding) 11.0.16.1+8-1+dde
阿里云评分 6.1
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 有限影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 DoS
  • 全网数量 N/A
CWE-ID 漏洞类型
NVD-CWE-noinfo
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  1