Description
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE
(subcomponent: Networking). Supported versions that are affected are Java
SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to
exploit vulnerability allows unauthenticated attacker with network access
via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized update, insert or
delete access to some of Java SE, Java SE Embedded accessible data as well
as unauthorized read access to a subset of Java SE, Java SE Embedded
accessible data. Note: This vulnerability applies to Java deployments,
typically in clients running sandboxed Java Web Start applications or
sandboxed Java applets (in Java SE 8), that load and run untrusted code
(e.g., code that comes from the internet) and rely on the Java sandbox for
security. This vulnerability can also be exploited by using APIs in the
specified Component, e.g., through a web service which supplies data to the
APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS
Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
Ubuntu-Description
Jonathan Birch discovered that the Networking component of OpenJDK did
not properly validate URLs in some situations. An attacker could use
this to bypass restrictions on characters in URLs.
Package
Upstream: | released
(12.0.2+9-1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | needs-triage
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(8u222-b10-1)
|
Ubuntu 18.04 LTS: | released
(8u222-b10-1ubuntu1~18.04.1)
|
Ubuntu 16.04 ESM: | released
(8u222-b10-1ubuntu1~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(11.0.4+11-1)
|
Ubuntu 18.04 LTS: | released
(11.0.4+11-1ubuntu2~18.04.3)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 13:54:16 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)