CVE-2024-10917
Eclipse OpenJ9 might return an incorrect value in JNI function GetStringUTFLength
Severity Score
3.7
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
In Eclipse OpenJ9 versions up to 0.47, the JNI function GetStringUTFLength may return an incorrect value which has wrapped around. From 0.48 the value is correct but may be truncated to include a smaller number of characters.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-11-06 CVE Reserved
- 2024-11-11 CVE Published
- 2024-11-12 CVE Updated
- 2024-11-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/eclipse-openj9/openj9/pull/20362 | ||
https://github.com/eclipse-openj9/openj9/releases/tag/openj9-0.48.0 | ||
https://gitlab.eclipse.org/security/cve-assignement/-/issues/47 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Eclipse Foundation Search vendor "Eclipse Foundation" | Open J9 Search vendor "Eclipse Foundation" for product "Open J9" | >= 0.8.0 <= 0.47.0 Search vendor "Eclipse Foundation" for product "Open J9" and version " >= 0.8.0 <= 0.47.0" | en |
Affected
|