Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2020/09/01/4 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html cve-icon cve-icon
https://access.redhat.com/errata/RHBA-2019:0959 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1146 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1163 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1164 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1165 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1166 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1238 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1325 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1518 cve-icon cve-icon
https://lists.apache.org/thread.html/38a01302c92ae513910d8c851a2d111736565bd698be4e3af3e4c063%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/71bd3e4e222479c266eaafc8d0c171ef5782a69b52f68df11b650ed7%40%3Cusers.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/c58d6c3b49c615916b163809f963a55421cac2264885739508e68108%40%3Cannounce.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/f7f54b4888060d99f59993f006e25005a2b58db0c07ff866bdcd6f17%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r1fd117082b992e7d43c1286e966c285f98aa362e685695d999ff42f7%40%3Cuser.cassandra.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r718e01f61b35409a4f7a3ccbc1cb5136a1558a9f9c2cb8d4ca9be1ce%40%3Cuser.cassandra.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rab8d90d28f944d84e4d7852f355a25c89451ae02c2decc4d355a9cfc%40%3Cuser.cassandra.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152%40%3Cdev.cassandra.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152%40%3Cuser.cassandra.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/05/msg00011.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-2684 cve-icon
https://seclists.org/bugtraq/2019/May/75 cve-icon cve-icon
https://security.gentoo.org/glsa/201908-10 cve-icon cve-icon
https://support.f5.com/csp/article/K11175903?utm_source=f5support&amp%3Butm_medium=RSS cve-icon cve-icon
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us cve-icon cve-icon
https://usn.ubuntu.com/3975-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-2684 cve-icon
https://www.debian.org/security/2019/dsa-4453 cve-icon cve-icon
History

Thu, 03 Oct 2024 08:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published: 2019-04-23T18:16:44

Updated: 2024-10-02T15:40:28.315Z

Reserved: 2018-12-14T00:00:00

Link: CVE-2019-2684

cve-icon Vulnrichment

Updated: 2024-08-04T18:56:45.576Z

cve-icon NVD

Status : Modified

Published: 2019-04-23T19:32:55.443

Modified: 2024-11-21T04:41:21.443

Link: CVE-2019-2684

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-04-16T00:00:00Z

Links: CVE-2019-2684 - Bugzilla