Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-2767

Опубликовано: 15 апр. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 5.8
CVSS3: 4.8

Описание

Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).

РелизСтатусПримечание
bionic

DNE

devel

released

14.0.1+7-1ubuntu1
eoan

ignored

end of life
esm-apps/focal

DNE

esm-infra-legacy/trusty

DNE

focal

DNE

precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

upstream

released

14.0.1+7-1

Показывать по

РелизСтатусПримечание
bionic

not-affected

openjdk-11 and newer
devel

not-affected

openjdk-11 and newer
eoan

not-affected

openjdk-11 and newer
esm-apps/bionic

not-affected

openjdk-11 and newer
esm-apps/focal

not-affected

openjdk-11 and newer
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

openjdk-11 and newer
focal

not-affected

openjdk-11 and newer
precise/esm

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
bionic

released

11.0.7+10-2ubuntu2~18.04
devel

released

11.0.7+10-2ubuntu1
eoan

released

11.0.7+10-2ubuntu2~19.10
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

11.0.7+10-2ubuntu2~18.04
esm-infra/focal

released

11.0.7+10-2ubuntu1
focal

released

11.0.7+10-2ubuntu1
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

Показывать по

5.8 Medium

CVSS2

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.8
redhat
почти 6 лет назад

Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).

CVSS3: 4.8
nvd
почти 6 лет назад

Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).

CVSS3: 4.8
debian
почти 6 лет назад

Vulnerability in the Java SE product of Oracle Java SE (component: JSS ...

CVSS3: 4.8
github
больше 3 лет назад

Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).

CVSS3: 4.8
fstec
почти 6 лет назад

Уязвимость компонента JSSE программной платформы Java SE, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

5.8 Medium

CVSS2

4.8 Medium

CVSS3