Description
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2193-1 | openjdk-7 security update |
Debian DSA |
DSA-4662-1 | openjdk-11 security update |
Debian DSA |
DSA-4668-1 | openjdk-8 security update |
EUVD |
EUVD-2020-22574 | Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). |
Ubuntu USN |
USN-4337-1 | OpenJDK vulnerabilities |
References
History
Mon, 30 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Mcafee
Subscribe
Threat Intelligence Exchange Server
Subscribe
Netapp
Subscribe
7-mode Transition Tool
Subscribe
Active Iq Unified Manager
Subscribe
Cloud Backup
Subscribe
Cloud Secure Agent
Subscribe
E-series Performance Analyzer
Subscribe
E-series Santricity Os Controller
Subscribe
E-series Santricity Web Services
Subscribe
Oncommand Insight
Subscribe
Oncommand Workflow Automation
Subscribe
Santricity Unified Manager
Subscribe
Snapmanager
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
Storagegrid
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Oracle
Subscribe
Jdk
Subscribe
Jre
Subscribe
Openjdk
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel E4s
Subscribe
Rhel Extras
Subscribe
Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2024-09-30T15:05:39.406Z
Reserved: 2019-12-10T00:00:00.000Z
Link: CVE-2020-2781
Updated: 2024-08-04T07:17:02.849Z
Status : Modified
Published: 2020-04-15T14:15:27.030
Modified: 2024-11-21T05:26:15.350
Link: CVE-2020-2781
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN