CVE-2020-2583

Source
https://cve.org/CVERecord?id=CVE-2020-2583
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-2583.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-2583
Aliases
Downstream
Related
Published
2020-01-15T17:15:19.130Z
Modified
2026-05-15T12:03:14.473226335Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
            ],
            "vendor_product": "canonical:ubuntu_linux",
            "extracted_events": [
                {
                    "last_affected": "16.04"
                },
                {
                    "last_affected": "18.04"
                },
                {
                    "last_affected": "19.10"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "debian:debian_linux",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                },
                {
                    "last_affected": "9.0"
                },
                {
                    "last_affected": "10.0"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*",
                "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*",
                "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*",
                "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*",
                "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*",
                "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*",
                "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*",
                "cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*",
                "cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*"
            ],
            "vendor_product": "mcafee:epolicy_orchestrator",
            "extracted_events": [
                {
                    "last_affected": "5.9.0"
                },
                {
                    "last_affected": "5.9.1"
                },
                {
                    "last_affected": "5.10.0-NA"
                },
                {
                    "last_affected": "5.10.0-update_1"
                },
                {
                    "last_affected": "5.10.0-update_2"
                },
                {
                    "last_affected": "5.10.0-update_3"
                },
                {
                    "last_affected": "5.10.0-update_4"
                },
                {
                    "last_affected": "5.10.0-update_5"
                },
                {
                    "last_affected": "5.10.0-update_6"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
            ],
            "vendor_product": "netapp:active_iq_unified_manager",
            "extracted_events": [
                {
                    "introduced": "7.3"
                },
                {
                    "introduced": "9.5"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
            ],
            "vendor_product": "netapp:e-series_santricity_os_controller",
            "extracted_events": [
                {
                    "introduced": "11.0.0"
                },
                {
                    "last_affected": "11.60.3"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
            ],
            "vendor_product": "opensuse:leap",
            "extracted_events": [
                {
                    "last_affected": "15.1"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:oracle:jdk:1.7.0:update241:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:jdk:11.0.5:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:jdk:13.0.1:*:*:*:*:*:*:*"
            ],
            "vendor_product": "oracle:jdk",
            "extracted_events": [
                {
                    "last_affected": "1.7.0-update241"
                },
                {
                    "last_affected": "1.8.0-update231"
                },
                {
                    "last_affected": "11.0.5"
                },
                {
                    "last_affected": "13.0.1"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:oracle:jre:1.7.0:update_241:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:jre:1.8.0:update_231:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:jre:11.0.5:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:jre:13.0.1:*:*:*:*:*:*:*"
            ],
            "vendor_product": "oracle:jre",
            "extracted_events": [
                {
                    "last_affected": "1.7.0-update_241"
                },
                {
                    "last_affected": "1.8.0-update_231"
                },
                {
                    "last_affected": "11.0.5"
                },
                {
                    "last_affected": "13.0.1"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:oracle:openjdk:11.0.1:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:11.0.2:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:11.0.3:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:11.0.4:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:11.0.5:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:13.0.1:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*"
            ],
            "vendor_product": "oracle:openjdk",
            "extracted_events": [
                {
                    "last_affected": "7-NA"
                },
                {
                    "last_affected": "7-NA"
                },
                {
                    "last_affected": "7-NA"
                },
                {
                    "last_affected": "7-update241"
                },
                {
                    "last_affected": "7-update241"
                },
                {
                    "last_affected": "7-update241"
                },
                {
                    "last_affected": "8-NA"
                },
                {
                    "last_affected": "8-NA"
                },
                {
                    "last_affected": "8-NA"
                },
                {
                    "last_affected": "8-update152"
                },
                {
                    "last_affected": "8-update152"
                },
                {
                    "last_affected": "8-update152"
                },
                {
                    "last_affected": "8-update162"
                },
                {
                    "last_affected": "8-update162"
                },
                {
                    "last_affected": "8-update162"
                },
                {
                    "last_affected": "8-update172"
                },
                {
                    "last_affected": "8-update172"
                },
                {
                    "last_affected": "8-update172"
                },
                {
                    "last_affected": "8-update192"
                },
                {
                    "last_affected": "8-update192"
                },
                {
                    "last_affected": "8-update192"
                },
                {
                    "last_affected": "8-update202"
                },
                {
                    "last_affected": "8-update202"
                },
                {
                    "last_affected": "8-update202"
                },
                {
                    "last_affected": "8-update212"
                },
                {
                    "last_affected": "8-update212"
                },
                {
                    "last_affected": "8-update212"
                },
                {
                    "last_affected": "8-update222"
                },
                {
                    "last_affected": "8-update222"
                },
                {
                    "last_affected": "8-update222"
                },
                {
                    "last_affected": "8-update232"
                },
                {
                    "last_affected": "8-update232"
                },
                {
                    "last_affected": "8-update232"
                },
                {
                    "last_affected": "11.0.1"
                },
                {
                    "last_affected": "11.0.1"
                },
                {
                    "last_affected": "11.0.1"
                },
                {
                    "last_affected": "11.0.2"
                },
                {
                    "last_affected": "11.0.2"
                },
                {
                    "last_affected": "11.0.2"
                },
                {
                    "last_affected": "11.0.3"
                },
                {
                    "last_affected": "11.0.3"
                },
                {
                    "last_affected": "11.0.3"
                },
                {
                    "last_affected": "11.0.4"
                },
                {
                    "last_affected": "11.0.4"
                },
                {
                    "last_affected": "11.0.4"
                },
                {
                    "last_affected": "11.0.5"
                },
                {
                    "last_affected": "11.0.5"
                },
                {
                    "last_affected": "11.0.5"
                },
                {
                    "last_affected": "13.0.1"
                },
                {
                    "last_affected": "13.0.1"
                },
                {
                    "last_affected": "13.0.1"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "redhat:enterprise_linux",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "redhat:enterprise_linux_desktop",
            "extracted_events": [
                {
                    "last_affected": "6.0"
                },
                {
                    "last_affected": "7.0"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"
            ],
            "vendor_product": "redhat:enterprise_linux_eus",
            "extracted_events": [
                {
                    "last_affected": "7.7"
                },
                {
                    "last_affected": "8.1"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "redhat:enterprise_linux_server",
            "extracted_events": [
                {
                    "last_affected": "6.0"
                },
                {
                    "last_affected": "7.0"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
            ],
            "vendor_product": "redhat:enterprise_linux_server_aus",
            "extracted_events": [
                {
                    "last_affected": "7.7"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
            ],
            "vendor_product": "redhat:enterprise_linux_server_tus",
            "extracted_events": [
                {
                    "last_affected": "7.7"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "redhat:enterprise_linux_workstation",
            "extracted_events": [
                {
                    "last_affected": "6.0"
                },
                {
                    "last_affected": "7.0"
                }
            ]
        }
    ]
}
References

Affected packages