ID CVE-2020-14562
Summary Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:jdk:11.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:11.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:14.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:14.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
CVSS
Base: 5.0 (as of 27-09-2022 - 20:14)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
rpms
  • java-11-openjdk-1:11.0.8.10-0.el7_8
  • java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8
  • java-11-openjdk-demo-1:11.0.8.10-0.el7_8
  • java-11-openjdk-devel-1:11.0.8.10-0.el7_8
  • java-11-openjdk-headless-1:11.0.8.10-0.el7_8
  • java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8
  • java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8
  • java-11-openjdk-jmods-1:11.0.8.10-0.el7_8
  • java-11-openjdk-src-1:11.0.8.10-0.el7_8
  • java-11-openjdk-1:11.0.8.10-0.el8_2
  • java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2
  • java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2
  • java-11-openjdk-demo-1:11.0.8.10-0.el8_2
  • java-11-openjdk-devel-1:11.0.8.10-0.el8_2
  • java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2
  • java-11-openjdk-headless-1:11.0.8.10-0.el8_2
  • java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2
  • java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2
  • java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2
  • java-11-openjdk-jmods-1:11.0.8.10-0.el8_2
  • java-11-openjdk-src-1:11.0.8.10-0.el8_2
  • java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2
  • java-11-openjdk-1:11.0.8.10-0.el8_0
  • java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0
  • java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0
  • java-11-openjdk-demo-1:11.0.8.10-0.el8_0
  • java-11-openjdk-devel-1:11.0.8.10-0.el8_0
  • java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0
  • java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0
  • java-11-openjdk-headless-1:11.0.8.10-0.el8_0
  • java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0
  • java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0
  • java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0
  • java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0
  • java-11-openjdk-jmods-1:11.0.8.10-0.el8_0
  • java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0
  • java-11-openjdk-src-1:11.0.8.10-0.el8_0
  • java-11-openjdk-1:11.0.8.10-0.el8_1
  • java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_1
  • java-11-openjdk-debugsource-1:11.0.8.10-0.el8_1
  • java-11-openjdk-demo-1:11.0.8.10-0.el8_1
  • java-11-openjdk-devel-1:11.0.8.10-0.el8_1
  • java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_1
  • java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_1
  • java-11-openjdk-headless-1:11.0.8.10-0.el8_1
  • java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_1
  • java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_1
  • java-11-openjdk-javadoc-1:11.0.8.10-0.el8_1
  • java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_1
  • java-11-openjdk-jmods-1:11.0.8.10-0.el8_1
  • java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_1
  • java-11-openjdk-src-1:11.0.8.10-0.el8_1
refmap via4
confirm https://security.netapp.com/advisory/ntap-20200717-0005/
debian DSA-4734
fedora
  • FEDORA-2020-5d0b4a2b5b
  • FEDORA-2020-93cc9c3ef2
gentoo GLSA-202008-24
misc https://www.oracle.com/security-alerts/cpujul2020.html
suse
  • openSUSE-SU-2020:1175
  • openSUSE-SU-2020:1191
ubuntu USN-4433-1
Last major update 27-09-2022 - 20:14
Published 15-07-2020 - 18:15
Last modified 27-09-2022 - 20:14
Back to Top