CVE-2019-2981
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Published
2019-10-16T18:15:32.543
Last Modified
2024-11-21T04:41:55.340
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 3.7 (LOW)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:N/I:N/A:P
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
8.6
Impact Score
2.9
Weaknesses
-
Type: Primary
NVD-CWE-noinfo
Affected Vendors & Products
References
-
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
Mailing List, Third Party Advisory
([email protected])
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Patch, Vendor Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:3134
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:3135
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:3136
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:3157
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:3158
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:4109
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:4110
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:4113
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:4115
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2020:0006
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2020:0046
Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
Mailing List, Third Party Advisory
([email protected])
-
https://seclists.org/bugtraq/2019/Oct/27
Mailing List, Third Party Advisory
([email protected])
-
https://seclists.org/bugtraq/2019/Oct/31
Mailing List, Third Party Advisory
([email protected])
-
https://security.netapp.com/advisory/ntap-20191017-0001/
Third Party Advisory
([email protected])
-
https://usn.ubuntu.com/4223-1/
Third Party Advisory
([email protected])
-
https://www.debian.org/security/2019/dsa-4546
Third Party Advisory
([email protected])
-
https://www.debian.org/security/2019/dsa-4548
Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:3134
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:3135
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:3136
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:3157
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:3158
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:4109
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:4110
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:4113
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:4115
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2020:0006
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2020:0046
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://seclists.org/bugtraq/2019/Oct/27
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://seclists.org/bugtraq/2019/Oct/31
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.netapp.com/advisory/ntap-20191017-0001/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://usn.ubuntu.com/4223-1/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2019/dsa-4546
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2019/dsa-4548
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)