mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
170 lines
6.8 KiB
JSON
170 lines
6.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert_us@oracle.com",
|
|
"ID": "CVE-2020-2654",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Java",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "Java SE: 7u241, 8u231, 11.0.5, 13.0.1",
|
|
"version_affected": "="
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Oracle Corporation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"baseScore": "3.7",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"version": "3.0"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE."
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0128",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0128"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0122",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0122"
|
|
},
|
|
{
|
|
"refsource": "DEBIAN",
|
|
"name": "DSA-4605",
|
|
"url": "https://www.debian.org/security/2020/dsa-4605"
|
|
},
|
|
{
|
|
"refsource": "BUGTRAQ",
|
|
"name": "20200120 [SECURITY] [DSA 4605-1] openjdk-11 security update",
|
|
"url": "https://seclists.org/bugtraq/2020/Jan/24"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0157",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0157"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0196",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0196"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://security.netapp.com/advisory/ntap-20200122-0003/",
|
|
"url": "https://security.netapp.com/advisory/ntap-20200122-0003/"
|
|
},
|
|
{
|
|
"refsource": "SUSE",
|
|
"name": "openSUSE-SU-2020:0113",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"
|
|
},
|
|
{
|
|
"refsource": "SUSE",
|
|
"name": "openSUSE-SU-2020:0147",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0232",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0232"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0231",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0231"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0202",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0202"
|
|
},
|
|
{
|
|
"refsource": "UBUNTU",
|
|
"name": "USN-4257-1",
|
|
"url": "https://usn.ubuntu.com/4257-1/"
|
|
},
|
|
{
|
|
"refsource": "DEBIAN",
|
|
"name": "DSA-4621",
|
|
"url": "https://www.debian.org/security/2020/dsa-4621"
|
|
},
|
|
{
|
|
"refsource": "BUGTRAQ",
|
|
"name": "20200216 [SECURITY] [DSA 4621-1] openjdk-8 security update",
|
|
"url": "https://seclists.org/bugtraq/2020/Feb/22"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0541",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0541"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0632",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0632"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[debian-lts-announce] 20200229 [SECURITY] [DLA 2128-1] openjdk-7 security update",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10315",
|
|
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10315"
|
|
},
|
|
{
|
|
"refsource": "GENTOO",
|
|
"name": "GLSA-202101-19",
|
|
"url": "https://security.gentoo.org/glsa/202101-19"
|
|
}
|
|
]
|
|
}
|
|
} |