Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
],
"vendor_product": "canonical:ubuntu_linux",
"extracted_events": [
{
"last_affected": "16.04"
},
{
"last_affected": "18.04"
},
{
"last_affected": "19.10"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
],
"vendor_product": "debian:debian_linux",
"extracted_events": [
{
"last_affected": "8.0"
},
{
"last_affected": "9.0"
},
{
"last_affected": "10.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*"
],
"vendor_product": "mcafee:epolicy_orchestrator",
"extracted_events": [
{
"last_affected": "5.9.0"
},
{
"last_affected": "5.9.1"
},
{
"last_affected": "5.10.0-NA"
},
{
"last_affected": "5.10.0-update_1"
},
{
"last_affected": "5.10.0-update_2"
},
{
"last_affected": "5.10.0-update_3"
},
{
"last_affected": "5.10.0-update_4"
},
{
"last_affected": "5.10.0-update_5"
},
{
"last_affected": "5.10.0-update_6"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
],
"vendor_product": "netapp:active_iq_unified_manager",
"extracted_events": [
{
"introduced": "7.3"
},
{
"introduced": "9.5"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
],
"vendor_product": "netapp:e-series_santricity_os_controller",
"extracted_events": [
{
"introduced": "11.0.0"
},
{
"last_affected": "11.60.3"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
],
"vendor_product": "opensuse:leap",
"extracted_events": [
{
"last_affected": "15.1"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:jdk:1.7.0:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:13.0.1:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:jdk",
"extracted_events": [
{
"last_affected": "1.7.0-update241"
},
{
"last_affected": "1.8.0-update231"
},
{
"last_affected": "11.0.5"
},
{
"last_affected": "13.0.1"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:jre:1.7.0:update_241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update_231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:13.0.1:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:jre",
"extracted_events": [
{
"last_affected": "1.7.0-update_241"
},
{
"last_affected": "1.8.0-update_231"
},
{
"last_affected": "11.0.5"
},
{
"last_affected": "13.0.1"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:openjdk:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:13.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*"
],
"vendor_product": "oracle:openjdk",
"extracted_events": [
{
"last_affected": "7-NA"
},
{
"last_affected": "7-NA"
},
{
"last_affected": "7-NA"
},
{
"last_affected": "7-update241"
},
{
"last_affected": "7-update241"
},
{
"last_affected": "7-update241"
},
{
"last_affected": "8-NA"
},
{
"last_affected": "8-NA"
},
{
"last_affected": "8-NA"
},
{
"last_affected": "8-update152"
},
{
"last_affected": "8-update152"
},
{
"last_affected": "8-update152"
},
{
"last_affected": "8-update162"
},
{
"last_affected": "8-update162"
},
{
"last_affected": "8-update162"
},
{
"last_affected": "8-update172"
},
{
"last_affected": "8-update172"
},
{
"last_affected": "8-update172"
},
{
"last_affected": "8-update192"
},
{
"last_affected": "8-update192"
},
{
"last_affected": "8-update192"
},
{
"last_affected": "8-update202"
},
{
"last_affected": "8-update202"
},
{
"last_affected": "8-update202"
},
{
"last_affected": "8-update212"
},
{
"last_affected": "8-update212"
},
{
"last_affected": "8-update212"
},
{
"last_affected": "8-update222"
},
{
"last_affected": "8-update222"
},
{
"last_affected": "8-update222"
},
{
"last_affected": "8-update232"
},
{
"last_affected": "8-update232"
},
{
"last_affected": "8-update232"
},
{
"last_affected": "11.0.1"
},
{
"last_affected": "11.0.1"
},
{
"last_affected": "11.0.1"
},
{
"last_affected": "11.0.2"
},
{
"last_affected": "11.0.2"
},
{
"last_affected": "11.0.2"
},
{
"last_affected": "11.0.3"
},
{
"last_affected": "11.0.3"
},
{
"last_affected": "11.0.3"
},
{
"last_affected": "11.0.4"
},
{
"last_affected": "11.0.4"
},
{
"last_affected": "11.0.4"
},
{
"last_affected": "11.0.5"
},
{
"last_affected": "11.0.5"
},
{
"last_affected": "11.0.5"
},
{
"last_affected": "13.0.1"
},
{
"last_affected": "13.0.1"
},
{
"last_affected": "13.0.1"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux_desktop",
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux_eus",
"extracted_events": [
{
"last_affected": "7.7"
},
{
"last_affected": "8.1"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux_server",
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux_server_aus",
"extracted_events": [
{
"last_affected": "7.7"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux_server_tus",
"extracted_events": [
{
"last_affected": "7.7"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux_workstation",
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
]
}
]
}