Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "4.0.0-beta1"
}
],
"source": "CPE_FIELD",
"vendor_product": "apache:cassandra"
},
{
"cpes": [
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "16.04"
},
{
"last_affected": "18.04"
},
{
"last_affected": "18.10"
},
{
"last_affected": "19.04"
}
],
"source": "CPE_FIELD",
"vendor_product": "canonical:ubuntu_linux"
},
{
"cpes": [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.0"
},
{
"last_affected": "9.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "debian:debian_linux"
},
{
"cpes": [
"cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
],
"extracted_events": [
{
"fixed": "8.6.5-00"
}
],
"source": "CPE_FIELD",
"vendor_product": "hp:xp7_command_view"
},
{
"cpes": [
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "15.0"
},
{
"last_affected": "42.3"
}
],
"source": "CPE_FIELD",
"vendor_product": "opensuse:leap"
},
{
"cpes": [
"cpe:2.3:a:oracle:jdk:1.7.0:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:12:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "1.7.0-update211"
},
{
"last_affected": "1.8.0-update201"
},
{
"last_affected": "1.8.0-update202"
},
{
"last_affected": "11.0.2"
},
{
"last_affected": "12"
}
],
"source": "CPE_FIELD",
"vendor_product": "oracle:jdk"
},
{
"cpes": [
"cpe:2.3:a:oracle:jre:1.7.0:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:12:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "1.7.0-update211"
},
{
"last_affected": "1.8.0-update201"
},
{
"last_affected": "1.8.0-update202"
},
{
"last_affected": "11.0.2"
},
{
"last_affected": "12"
}
],
"source": "CPE_FIELD",
"vendor_product": "oracle:jre"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_desktop"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.1"
},
{
"last_affected": "8.2"
},
{
"last_affected": "8.4"
},
{
"last_affected": "8.6"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_eus"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.2"
},
{
"last_affected": "8.4"
},
{
"last_affected": "8.6"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server_aus"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.2"
},
{
"last_affected": "8.4"
},
{
"last_affected": "8.6"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server_tus"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_workstation"
},
{
"cpes": [
"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "3.11"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:openshift_container_platform"
},
{
"cpes": [
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "5.8"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:satellite"
}
]
}{
"extracted_events": [
{
"introduced": "2.1.0"
},
{
"fixed": "2.1.22"
},
{
"introduced": "2.2.0"
},
{
"fixed": "2.2.18"
},
{
"introduced": "3.0.0"
},
{
"fixed": "3.0.22"
},
{
"introduced": "3.11.0"
},
{
"fixed": "3.11.8"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*"
}{
"extracted_events": [
{
"introduced": "7.0.0"
},
{
"last_affected": "7.0.97"
},
{
"introduced": "8.5.0"
},
{
"last_affected": "8.5.47"
},
{
"introduced": "9.0.1"
},
{
"last_affected": "9.0.28"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone1"
},
{
"last_affected": "9.0.0-milestone10"
},
{
"last_affected": "9.0.0-milestone11"
},
{
"last_affected": "9.0.0-milestone12"
},
{
"last_affected": "9.0.0-milestone13"
},
{
"last_affected": "9.0.0-milestone14"
},
{
"last_affected": "9.0.0-milestone15"
},
{
"last_affected": "9.0.0-milestone16"
},
{
"last_affected": "9.0.0-milestone17"
},
{
"last_affected": "9.0.0-milestone18"
},
{
"last_affected": "9.0.0-milestone19"
},
{
"last_affected": "9.0.0-milestone2"
},
{
"last_affected": "9.0.0-milestone20"
},
{
"last_affected": "9.0.0-milestone21"
},
{
"last_affected": "9.0.0-milestone22"
},
{
"last_affected": "9.0.0-milestone23"
},
{
"last_affected": "9.0.0-milestone24"
},
{
"last_affected": "9.0.0-milestone25"
},
{
"last_affected": "9.0.0-milestone26"
},
{
"last_affected": "9.0.0-milestone27"
},
{
"last_affected": "9.0.0-milestone3"
},
{
"last_affected": "9.0.0-milestone4"
},
{
"last_affected": "9.0.0-milestone5"
},
{
"last_affected": "9.0.0-milestone6"
},
{
"last_affected": "9.0.0-milestone7"
},
{
"last_affected": "9.0.0-milestone8"
},
{
"last_affected": "9.0.0-milestone9"
}
],
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*"
]
}