Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2018-12539
PUBLISHED
More InfoOfficial Page
Assigner-eclipse
Assigner Org ID-e51fbebd-6053-4e49-959f-1b94eeb69a2c
View Known Exploited Vulnerability (KEV) details
Published At-14 Aug, 2018 | 19:00
Updated At-05 Aug, 2024 | 08:38
Rejected At-
▼CVE Numbering Authority (CNA)

In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no.

Affected Products
Vendor
Eclipse Foundation AISBLThe Eclipse Foundation
Product
Eclipse OpenJ9
Versions
Affected
  • 0.8
Problem Types
TypeCWE IDDescription
CWECWE-419CWE-419: Unprotected Primary Channel
Type: CWE
CWE ID: CWE-419
Description: CWE-419: Unprotected Primary Channel
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2018:2713
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2575
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2576
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2568
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2569
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2712
vendor-advisory
x_refsource_REDHAT
http://www.securitytracker.com/id/1041765
vdb-entry
x_refsource_SECTRACK
http://www.securityfocus.com/bid/105126
vdb-entry
x_refsource_BID
https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589
x_refsource_CONFIRM
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
x_refsource_MISC
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2713
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2575
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2576
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2568
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2569
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2712
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.securitytracker.com/id/1041765
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securityfocus.com/bid/105126
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2018:2713
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2018:2575
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2018:2576
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2018:2568
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2018:2569
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2018:2712
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.securitytracker.com/id/1041765
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securityfocus.com/bid/105126
vdb-entry
x_refsource_BID
x_transferred
https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589
x_refsource_CONFIRM
x_transferred
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
x_refsource_MISC
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2713
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2575
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2576
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2568
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2569
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2712
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.securitytracker.com/id/1041765
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securityfocus.com/bid/105126
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Resource:
x_refsource_MISC
x_transferred
Details not found