CVE-2017-10355

MEDIUM

Oracle Jdk < 11.70.1 - Denial of Service

Title source: rule
STIX 2.1

Description

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Exploits (1)

exploitdb WORKING POC
by SecuriTeam · dosphp
https://www.exploit-db.com/exploits/44057

References (18)

Core 18
Core References
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:3047
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201711-14
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2017/dsa-4015
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:3267
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:2998
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:3268
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:3046
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201710-31
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:3264
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2017/dsa-4048
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:3453
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:3392
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20171019-0001/
Broken Link vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/101369
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:2999
Broken Link vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1039596

Scores

CVSS v3 5.3
EPSS 0.0630
EPSS Percentile 91.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

Status published
Products (47)
debian/debian_linux 7.0
debian/debian_linux 8.0
debian/debian_linux 9.0
netapp/active_iq_unified_manager 7.3
netapp/active_iq_unified_manager 9.5
netapp/cloud_backup
netapp/e-series_santricity_management_plug-ins
netapp/e-series_santricity_os_controller 11.0 - 11.70.1
netapp/e-series_santricity_storage_manager
netapp/e-series_santricity_web_services
... and 37 more
Published Oct 19, 2017
Tracked Since Feb 18, 2026