Severity
9.8CRITICAL
EPSS
0.8%
top 26.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 11
Latest updateMay 14

Description

In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages6 packages

NVDeclipse/openj9< 0.12.0
CVEListV5the_eclipse_foundation/eclipse_openj9unspecified0.12.0

🔴Vulnerability Details

2
GHSA
GHSA-5qhh-4q6m-8w7h: In Eclipse OpenJ9, prior to the 02022-05-14
CVEList
CVE-2018-12547: In Eclipse OpenJ9, prior to the 02019-02-11

📋Vendor Advisories

1
Red Hat
JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()2019-03-01

💬Community

1
Bugzilla
CVE-2018-12547 IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()2019-03-05
CVE-2018-12547 (CRITICAL CVSS 9.8) | In Eclipse OpenJ9 | cvebase.io