Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-39399

Опубликовано: 18 окт. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 3.7

Описание

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code i...

РелизСтатусПримечание
bionic

not-affected

OpenJDK only
devel

not-affected

OpenJDK only
esm-apps/bionic

not-affected

OpenJDK only
esm-apps/focal

not-affected

OpenJDK only
esm-apps/jammy

not-affected

OpenJDK only
esm-apps/xenial

not-affected

OpenJDK only
focal

not-affected

OpenJDK only
jammy

not-affected

OpenJDK only
kinetic

not-affected

OpenJDK only
lunar

not-affected

OpenJDK only

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-apps/focal

ignored

superseded by openjdk-17
focal

ignored

end of standard support, was ignored [superseded by openjdk-17]
jammy

DNE

kinetic

DNE

lunar

DNE

trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-apps/focal

ignored

superseded by openjdk-17
focal

ignored

end of standard support, was ignored [superseded by openjdk-17]
jammy

DNE

kinetic

DNE

lunar

DNE

trusty

DNE

upstream

ignored

superseded by openjdk-17
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

released

17.0.5+8-2ubuntu1~18.04
devel

released

17.0.5+8-2ubuntu1
esm-apps/jammy

released

17.0.5+8-2ubuntu1~22.04
esm-infra/focal

DNE

focal was released [17.0.5+8-2ubuntu1~20.04]
focal

released

17.0.5+8-2ubuntu1~20.04
jammy

released

17.0.5+8-2ubuntu1~22.04
kinetic

released

17.0.5+8-2ubuntu1
lunar

released

17.0.5+8-2ubuntu1
trusty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

ignored

superseded by openjdk-19
esm-apps/jammy

ignored

superseded by openjdk-19
esm-infra/focal

DNE

focal

DNE

jammy

ignored

superseded by openjdk-19
kinetic

ignored

superseded by openjdk-19
lunar

ignored

superseded by openjdk-19
trusty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

19.0.1+10-1
esm-infra/focal

DNE

focal

DNE

jammy

released

19.0.1+10-1ubuntu1~22.04
kinetic

released

19.0.1+10-1
lunar

not-affected

19.0.1+10-1
trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

code not present
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
kinetic

not-affected

code not present
lunar

not-affected

code not present

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-apps/xenial

ignored

no longer supported by upstream
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

trusty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

released

11.0.17+8-1ubuntu2~18.04
devel

not-affected

11.0.17+8-1ubuntu2
esm-infra/bionic

not-affected

11.0.17+8-1ubuntu2~18.04
esm-infra/focal

not-affected

11.0.17+8-1ubuntu2~20.04
focal

released

11.0.17+8-1ubuntu2~20.04
jammy

released

11.0.17+8-1ubuntu2~22.04
kinetic

released

11.0.17+8-1ubuntu2
lunar

not-affected

11.0.17+8-1ubuntu2
trusty

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 41%
0.0019
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
redhat
больше 2 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code i...

CVSS3: 3.7
nvd
больше 2 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code inst

CVSS3: 3.7
debian
больше 2 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition ...

CVSS3: 3.7
github
больше 2 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code i...

CVSS3: 3.7
fstec
больше 2 лет назад

Уязвимость компонента Networking программной платформы Oracle Java SE и виртуальной машины Oracle GraalVM Enterprise Edition, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных

EPSS

Процентиль: 41%
0.0019
Низкий

3.7 Low

CVSS3