CVE-2018-12547
moderate-risk
Published 2019-02-11
In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.
Do I need to act?
-
0.78% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (8)
References (14)
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0469
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0472
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0473
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0474
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0640
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0469
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0472
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0473
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0474
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0640
49
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
3/34 · Minimal
Exposure
14/34 · Moderate