Description
Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Published: 2020-01-15
Score: 3.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2128-1 openjdk-7 security update
Debian DSA Debian DSA DSA-4605-1 openjdk-11 security update
Debian DSA Debian DSA DSA-4621-1 openjdk-8 security update
EUVD EUVD EUVD-2020-22447 Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Ubuntu USN Ubuntu USN USN-4257-1 OpenJDK vulnerabilities
History

Tue, 01 Oct 2024 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Mcafee Epolicy Orchestrator
Netapp Active Iq Unified Manager E-series Performance Analyzer E-series Santricity Management Plug-ins E-series Santricity Os Controller E-series Santricity Storage Manager E-series Santricity Web Services Proxy Oncommand Insight Oncommand Workflow Automation Santricity Unified Manager Steelstore Cloud Integrated Storage
Opensuse Leap
Oracle Jdk Jre Openjdk
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Eus Enterprise Linux Server Aus Enterprise Linux Server Tus Enterprise Linux Workstation Rhel E4s Rhel Extras
cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2024-09-30T15:59:18.682Z

Reserved: 2019-12-10T00:00:00.000Z

Link: CVE-2020-2654

cve-icon Vulnrichment

Updated: 2024-08-04T07:09:55.025Z

cve-icon NVD

Status : Modified

Published: 2020-01-15T17:15:24.050

Modified: 2024-11-21T05:25:54.230

Link: CVE-2020-2654

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-01-14T00:00:00Z

Links: CVE-2020-2654 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses