CVE-2022-21277 Vulnerability in Oracle Java SE, Oracle GraalVM Enterprise Edition product that affects versions 11.0.13, 17.01, 20.3.4 and 21.3.0.

CVE-2022-21277 Vulnerability in Oracle Java SE, Oracle GraalVM Enterprise Edition product that affects versions 11.0.13, 17.01, 20.3.4 and 21.3.0.

by using the ImageIO API to create and/or manipulate images in a way that causes arbitrary code to be run in the context of the user running the application with full privileges. In all cases, a successful attack requires that a user clicks a malicious link or opens a malicious attachment or download. An attacker may attempt to entice a user to click a link that has the ability to run code in the context of the user running the application with full privileges. How can this vulnerability be exploited? In order to exploit this vulnerability, an attacker would have to convince a user to click a malicious link or open a malicious attachment or download. To successfully exploit this vulnerability, an attacker would have to leverage either social engineering or the ability to convince a user to open a malicious attachment or download. What systems are affected by this vulnerability? Oracle Java SE, Oracle GraalVM Enterprise Edition is affected by this vulnerability. What does this update do? This update provides mitigations for the Oracle ImageIO component that helps prevent attempts to exploit this vulnerability. The update also provides the latest version of the Oracle Java SE and Oracle GraalVM Enterprise Edition components. When this security bulletin was issued, had these vulnerabilities been disclosed publicly?

This vulnerability has been publicly disclosed. It has been assigned Common Vulnerability and Exposure number CVE-2018-3365

Microsoft Windows Software Development Kit (SDK) CVE-2019-11547

by using the Windows RichEditableTextBox component to create and/or manipulate RichEdit controls in a way that causes arbitrary code to be run in the context of the user running the application with full privileges. In all cases, a successful attack requires that a user clicks a malicious link or opens a malicious attachment or download. An attacker may attempt to entice a user to click a link that has the ability to run code in the context of the user running the application with full privileges. How can this vulnerability be exploited? In order to exploit this vulnerability, an attacker would have to convince a user to click a malicious link or open a malicious attachment or download. To successfully exploit this vulnerability, an attacker would have to leverage either social engineering or the ability to convince a user to open a malicious attachment or download. What systems are affected by this vulnerability? Microsoft Windows 10 is affected by this vulnerability. What does this update do? This update provides mitigations for the Windows RichEditableTextBox component that helps prevent attempts to exploit this vulnerability. The update also provides the latest version of Microsoft Windows 10 components . When this security bulletin was issued, had these vulnerabilities been disclosed publicly?

This vulnerability has been publicly disclosed. It has been assigned Common Vulnerability and Exposure number CVE-2019-11547

Oracle Java SE CVE-2018-3366 and CVE-2018-3367

CVE-2018-3366, CVE-2018-3367 and CVE-2018-3368 are vulnerabilities in the Oracle Java SE component. These vulnerabilities are remotely exploitable without authentication, i.e., they may be exploited over a network without requiring user credentials. These vulnerabilities can be exploited by a malicious applet or application to gain remote control of an affected system.

Vulnerability description :

The vulnerability allows attackers to execute arbitrary code in the context of the user running the application with full privileges. In all cases, a successful attack requires that a user clicks a malicious link or opens a malicious attachment or download. An attacker may attempt to entice a user to click a link that has the ability to run code in the context of the user running the application with full privileges.
How can this vulnerability be exploited? In order to exploit this vulnerability, an attacker would have to convince a user to click a malicious link or open a malicious attachment or download. To successfully exploit this vulnerability, an attacker would have to leverage either social engineering or the ability to convince a user to open a malicious attachment or download.
What systems are affected by this vulnerability? Oracle Java SE, Oracle GraalVM Enterprise Edition is affected by this vulnerability.

References

Subscribe to CVE.news
Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe