Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2016-0264

CVE information

Published

6 years ago

Last Modified

11 months ago

CVSSv2.0 Severity

Medium

CVSSv3.1 Severity

Medium

Impact Analysis

Description

Buffer overflow in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) allows remote attackers to execute arbitrary code via unspecified vectors..

CVSSv2.0 Score

Severity
Medium
Base Score
6.8/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
6.4/10
Confidentiality Impact
Partial
Availability Impact
Partial
Integrity Impact
Partial

CVSSv3.1 Score

Severity
Medium
Base Score
5.6/10
Exploit Score
2.2/10
Access Vector
Network
Access Complexity
High
Privileges Required
None
Impact Score
3.4/10
Confidentiality Impact
Low
Availability Impact
Low
Integrity Impact
Low
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:
  Yes
- -
cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
  Yes
6.0.0.0 6.0.16.25
cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
  Yes
6.1.0.0 6.1.8.25
cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
  Yes
7.0.0.0 7.0.9.40
cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
  Yes
7.1.0.0 7.1.3.40
cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*
  Yes
8.0.0.0 8.0.3.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:
  Yes
- -
cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
  Yes
- -