=========================================================================== ZMCIRT Vulnerability Bulletin ZMC-2021.06.1.1200 IBM Java: Modify arbitrary files - Remote/unauthenticated 1st June 2021 =========================================================================== Product: IBM Java Publisher: IBM Operating System: Network Appliance Impact/Access: Modify Arbitrary Files -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-2161 Reference: ASB-2021.0076 ESB-2021.1826 ESB-2021.1786 Original Bulletin: https://www.ibm.com/support/pages/node/6454459 CVE-2021-2161 may affect IBM® SDK, Java™ Technology Edition Document Information Document number : 6454459 Modified date : 28 May 2021 Product : IBM Java Software version : All versions Operating system(s): Platform Independent Summary CVE-2021-2161 was disclosed in the Oracle April 2021 Critical Patch Update. Vulnerability Details CVEID: CVE-2021-2161 DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact. CVSS Base score: 5.9 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 200290 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) Affected Products and Versions 7.0.0.0 - 7.0.10.80 7.1.0.0 - 7.1.4.80 8.0.0.0 - 8.0.6.25 11.0.0.0 - 11.0.10.0 Note: CVE-2021-2161 is applicable only on Windows. Remediation/Fixes 7.0.10.85 7.1.4.85 8.0.6.30 11.0.11.0 Please refer to the IBM SDK, Java Technology Edition Security Vulnerabilities page for more information. IBM customers requiring an update for an SDK shipped with an IBM product should contact IBM support , and/or refer to the appropriate product security bulletin. APAR number: IJ32230 (CVE-2021-2161) Workarounds and Mitigations None Oracle April 2021 Java SE Critical Patch Update Advisory IBM SDK, Java Technology Edition Security Vulnerabilities Acknowledgement Change History 19 May 2021: Initial Publication 21 May 2021: Added note about platform applicability 28 May 2021: Added 11.0.11.0 to fixed releases ZMCIRT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. ZMCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Internet Email: report@cirt.zm Telephone: 7070 ZMCIRT personnel answer during Zambian business hours which are 8am to 5pm. On call after hours for member emergencies only. ===========================================================================
Copyright @2023 ZAMBIA CIRT