Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-21830

Опубликовано: 18 янв. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.3

Описание

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8 and 21.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code ...

РелизСтатусПримечание
bionic

not-affected

OpenJDK 8 only
devel

not-affected

OpenJDK 8 only
esm-apps/bionic

not-affected

OpenJDK 8 only
esm-apps/focal

not-affected

OpenJDK 8 only
esm-apps/jammy

not-affected

OpenJDK 8 only
esm-apps/noble

not-affected

OpenJDK 8 only
esm-apps/xenial

not-affected

OpenJDK 8 only
focal

not-affected

OpenJDK 8 only
jammy

not-affected

OpenJDK 8 only
kinetic

not-affected

OpenJDK 8 only

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-apps/focal

not-affected

OpenJDK 8 only
focal

not-affected

OpenJDK 8 only
jammy

DNE

kinetic

DNE

trusty

DNE

upstream

not-affected

OpenJDK 8 only
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-apps/focal

not-affected

OpenJDK 8 only
focal

not-affected

OpenJDK 8 only
jammy

DNE

kinetic

DNE

trusty

DNE

upstream

not-affected

OpenJDK 8 only
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

OpenJDK 8 only
devel

not-affected

esm-apps/bionic

not-affected

OpenJDK 8 only
esm-apps/jammy

not-affected

OpenJDK 8 only
esm-infra/focal

DNE

focal was not-affected [OpenJDK 8 only]
focal

not-affected

OpenJDK 8 only
jammy

not-affected

OpenJDK 8 only
kinetic

not-affected

OpenJDK 8 only
lunar

not-affected

noble

not-affected

OpenJDK 8 only

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

OpenJDK 8 only
esm-apps/jammy

not-affected

OpenJDK 8 only
esm-infra/focal

DNE

focal

DNE

jammy

not-affected

OpenJDK 8 only
kinetic

not-affected

OpenJDK 8 only
lunar

not-affected

OpenJDK 8 only
trusty

DNE

upstream

not-affected

OpenJDK 8 only

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

OpenJDK 8 only
esm-infra/focal

DNE

focal

DNE

jammy

not-affected

OpenJDK 8 only
kinetic

not-affected

OpenJDK 8 only
lunar

not-affected

OpenJDK 8 only
trusty

DNE

upstream

not-affected

OpenJDK 8 only
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

OpenJDK 8 only
esm-infra/focal

DNE

focal was not-affected [OpenJDK 8 only]
focal

not-affected

OpenJDK 8 only
jammy

not-affected

OpenJDK 8 only
kinetic

DNE

lunar

not-affected

OpenJDK 8 only
noble

not-affected

OpenJDK 8 only
oracular

not-affected

OpenJDK 8 only
plucky

not-affected

OpenJDK 8 only

Показывать по

РелизСтатусПримечание
bionic

released

8u362-ga-0ubuntu1~18.04.1
devel

not-affected

8u362-ga-0buntu1
esm-apps/bionic

released

8u362-ga-0ubuntu1~18.04.1
esm-apps/focal

released

8u362-ga-0ubuntu1~20.04.1
esm-apps/jammy

released

8u362-ga-0ubuntu1~22.04
esm-apps/noble

not-affected

8u362-ga-0buntu1
esm-infra/xenial

released

8u362-ga-0ubuntu1~16.04.1
focal

released

8u362-ga-0ubuntu1~20.04.1
jammy

released

8u362-ga-0ubuntu1~22.04
kinetic

released

8u362-ga-0ubuntu1~22.10

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-apps/xenial

not-affected

OpenJDK 8 only
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

not-affected

OpenJDK 8 only
xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

not-affected

OpenJDK 8 only
devel

not-affected

OpenJDK 8 only
esm-apps/noble

not-affected

OpenJDK 8 only
esm-infra/bionic

not-affected

OpenJDK 8 only
esm-infra/focal

not-affected

OpenJDK 8 only
focal

not-affected

OpenJDK 8 only
jammy

not-affected

OpenJDK 8 only
kinetic

not-affected

OpenJDK 8 only
lunar

not-affected

OpenJDK 8 only
noble

not-affected

OpenJDK 8 only

Показывать по

EPSS

Процентиль: 27%
0.00089
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 2 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8 and 21.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., c...

CVSS3: 5.3
nvd
больше 2 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8 and 21.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code

CVSS3: 5.3
debian
больше 2 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition ...

CVSS3: 5.3
github
больше 2 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8 and 21.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., c...

CVSS3: 5.3
fstec
больше 2 лет назад

Уязвимость компонента Serialization программной платформы Oracle Java SE и виртуальной машины Oracle GraalVM Enterprise Edition, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных

EPSS

Процентиль: 27%
0.00089
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2023-21830