Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-14796

Опубликовано: 21 окт. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 2.6
CVSS3: 3.1

Описание

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). ...

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needs-triage
groovy

ignored

end of life

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

kinetic

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-apps/focal

ignored

superseded by openjdk-17
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was ignored [superseded by openjdk-17]
groovy

ignored

end of life
hirsute

DNE

impish

DNE

jammy

DNE

kinetic

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

ignored

end of life
hirsute

ignored

end of life
impish

DNE

jammy

DNE

kinetic

DNE

Показывать по

РелизСтатусПримечание
bionic

released

8u272-b10-0ubuntu1~18.04
devel

not-affected

8u272-b10-0ubuntu1~20.10
esm-apps/bionic

released

8u272-b10-0ubuntu1~18.04
esm-apps/focal

released

8u272-b10-0ubuntu1~20.04
esm-apps/jammy

not-affected

8u272-b10-0ubuntu1~20.10
esm-apps/noble

not-affected

8u272-b10-0ubuntu1~20.10
esm-infra-legacy/trusty

DNE

esm-infra/xenial

released

8u272-b10-0ubuntu1~16.04
focal

released

8u272-b10-0ubuntu1~20.04
groovy

released

8u272-b10-0ubuntu1~20.10

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-apps/xenial

ignored

no longer supported by upstream
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

Показывать по

РелизСтатусПримечание
bionic

released

11.0.9+11-0ubuntu1~18.04.1
devel

released

11.0.9+11-0ubuntu2
esm-apps/noble

released

11.0.9+11-0ubuntu2
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

11.0.9+11-0ubuntu1~18.04.1
esm-infra/focal

released

11.0.9+11-0ubuntu1~20.04
focal

released

11.0.9+11-0ubuntu1~20.04
groovy

released

11.0.9+11-0ubuntu1
hirsute

released

11.0.9+11-0ubuntu2
impish

released

11.0.9+11-0ubuntu2

Показывать по

2.6 Low

CVSS2

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 3.1
redhat
больше 5 лет назад

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). ...

CVSS3: 3.1
nvd
больше 5 лет назад

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVS

CVSS3: 3.1
debian
больше 5 лет назад

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java ...

CVSS3: 3.1
github
больше 3 лет назад

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). ...

CVSS3: 3.7
fstec
больше 5 лет назад

Уязвимость компонента Libraries программных платформ Java SE, Java SE Embedded, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

2.6 Low

CVSS2

3.1 Low

CVSS3

Уязвимость CVE-2020-14796