IBM WebSphere DataPower XC10 2.1/2.5 Java SDK memory corruption
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.2 | $0-$5k | 0.00 |
Summary
A vulnerability was found in IBM WebSphere DataPower XC10 2.1/2.5. It has been declared as problematic. This issue affects some unknown processing of the component Java SDK. The manipulation results in memory corruption. This vulnerability is cataloged as CVE-2014-4263. There is no exploit available. Applying a patch is advised to resolve this issue.
Details
A vulnerability was found in IBM WebSphere DataPower XC10 2.1/2.5 (Application Server Software). It has been classified as problematic. Affected is some unknown processing of the component Java SDK. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, and integrity. CVE summarizes:
Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to "Diffie-Hellman key agreement."
The weakness was shared 12/08/2014 with Oracle as Reference #1691035 as confirmed advisory (Website). The advisory is shared for download at www-01.ibm.com. The advisory contains:
These issues were disclosed as part of the IBM SDK Java Technology Edition updates in July 2014.This vulnerability is traded as CVE-2014-4263 since 06/17/2014. The exploitability is told to be easy. It is possible to launch the attack remotely. Required for exploitation is a authentication. There are neither technical details nor an exploit publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 77333 (AIX Java Advisory : java_jul2014_advisory.asc), which helps to determine the existence of the flaw in a target environment. It is assigned to the family AIX Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 350346 (Amazon Linux Security Advisory for java-1.7.0-openjdk: ALAS-2014-383).
Applying a patch is able to eliminate this problem. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (94606), Tenable (77333), SecurityFocus (BID 68636†), Secunia (SA59503†) and SecurityTracker (ID 1031361†). The entries VDB-13217, VDB-13218, VDB-13219 and VDB-67096 are related to this item. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.ibm.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.4VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.4
VulDB Temp Score: 5.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 77333
Nessus Name: AIX Java Advisory : java_jul2014_advisory.asc
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 702980
OpenVAS Name: Debian Security Advisory DSA 2980-1 (openjdk-6 - security update)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
Reaction Time: 🔍
Exposure Time: 🔍
Timeline
06/17/2014 🔍07/15/2014 🔍
07/16/2014 🔍
07/17/2014 🔍
12/08/2014 🔍
12/08/2014 🔍
12/11/2014 🔍
12/12/2014 🔍
12/18/2014 🔍
01/04/2015 🔍
03/01/2022 🔍
Sources
Vendor: ibm.comAdvisory: Reference #1691035
Organization: Oracle
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-4263 (🔍)
GCVE (CVE): GCVE-0-2014-4263
GCVE (VulDB): GCVE-100-68424
OVAL: 🔍
IAVM: 🔍
X-Force: 94606
SecurityFocus: 68636 - Oracle Java SE CVE-2014-4263 Remote Security Vulnerability
Secunia: 59503 - Oracle JRockit Two Vulnerabilities, Less Critical
SecurityTracker: 1031361 - IBM WebSphere DataPower XC10 Bugs Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks and Let Local and Remote Authenticated Users Obtain Potentially Sensitive Information
Vulnerability Center: 47902 - [cpujul2014-1972956] Oracle Java SE and JRockit Unspecified Remote Vulnerability Related to Security - CVE-2014-4263, Medium
See also: 🔍
Entry
Created: 12/12/2014 10:29Updated: 03/01/2022 10:04
Changes: 12/12/2014 10:29 (77), 06/17/2017 07:28 (13), 03/01/2022 10:04 (3)
Complete: 🔍
Cache ID: 216:F23:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.