CVE-2016-0264
Published May 24, 2016
Last updated 3 years ago
Overview
- Description
- Buffer overflow in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) allows remote attackers to execute arbitrary code via unspecified vectors.
- Source
- psirt@us.ibm.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.6
- Impact score
- 3.4
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55C5561F-BE86-4EEA-99D4-8697F8BD9DFE" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D41A798E-0D69-43C7-9A63-1E5921138EAC" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "vulnerable": true, "matchCriteriaId": "A27846D2-F8BC-4A9B-9B59-E6E71BB869BC", "versionEndExcluding": "6.0.16.25", "versionStartIncluding": "6.0.0.0" }, { "criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "vulnerable": true, "matchCriteriaId": "9F139472-2499-44AF-A466-0043BB83E254", "versionEndExcluding": "6.1.8.25", "versionStartIncluding": "6.1.0.0" }, { "criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "vulnerable": true, "matchCriteriaId": "A44B197F-40EF-465F-9995-691EA879F121", "versionEndExcluding": "7.0.9.40", "versionStartIncluding": "7.0.0.0" }, { "criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "vulnerable": true, "matchCriteriaId": "626BA0D0-5526-4344-822B-0F5837C43C37", "versionEndExcluding": "7.1.3.40", "versionStartIncluding": "7.1.0.0" }, { "criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "vulnerable": true, "matchCriteriaId": "DDBE9092-9478-4899-88D2-95E4EDACB4FD", "versionEndExcluding": "8.0.3.0", "versionStartIncluding": "8.0.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4840254-CC76-4113-BC61-360BD15582B9" }, { "criteria": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85EA16E0-9261-45C4-840F-5366E9EAC5E1" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "585614D3-1DAA-4256-83DE-AFE901154808" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8440BA16-EAC4-4F27-99A4-795295DA6646" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C81647C-9A53-481D-A54C-36770A093F90" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "vulnerable": true, "matchCriteriaId": "35BBD83D-BDC7-4678-BE94-639F59281139" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "vulnerable": true, "matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*", "vulnerable": true, "matchCriteriaId": "B12243B2-D726-404C-ABFF-F1AB51BA1783" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55C5561F-BE86-4EEA-99D4-8697F8BD9DFE" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2076747F-A98E-4DD9-9B52-BF1732BCAD3D" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D41A798E-0D69-43C7-9A63-1E5921138EAC" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB2A1559-651C-46B0-B436-8E03DC8A60D2" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A633996-2FD7-467C-BAA6-529E16BD06D1" }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C649194-B8C2-49F7-A819-C635EE584ABF" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD4EEF7C-CC33-4494-8531-7C0CC28A8823" }, { "criteria": "cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CBED083-B935-4C47-BBDA-F39D8EA277ED" }, { "criteria": "cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD6136E8-74DE-48AF-A8AB-B0E93D34870C" } ], "operator": "OR" } ] } ]