We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2019-2422



Description

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).

Reserved 2018-12-14 | Published 2019-01-16 | Updated 2024-10-02 | Assigner oracle

Problem types

Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data.

Product status

Java SE: 7u201, 8u192, 11.0.1
affected

Java SE Embedded: 8u191
affected

References

access.redhat.com/errata/RHSA-2019:0462 (RHSA-2019:0462) vendor-advisory

access.redhat.com/errata/RHSA-2019:0464 (RHSA-2019:0464) vendor-advisory

security.netapp.com/advisory/ntap-20190118-0001/

access.redhat.com/errata/RHSA-2019:0435 (RHSA-2019:0435) vendor-advisory

access.redhat.com/errata/RHSA-2019:0416 (RHSA-2019:0416) vendor-advisory

security.gentoo.org/glsa/201903-14 (GLSA-201903-14) vendor-advisory

www.securityfocus.com/bid/106596 (106596) vdb-entry

access.redhat.com/errata/RHSA-2019:0474 (RHSA-2019:0474) vendor-advisory

www.oracle.com/.../security-advisory/cpujan2019-5072801.html

access.redhat.com/errata/RHSA-2019:0469 (RHSA-2019:0469) vendor-advisory

usn.ubuntu.com/3875-1/ (USN-3875-1) vendor-advisory

access.redhat.com/errata/RHSA-2019:0473 (RHSA-2019:0473) vendor-advisory

access.redhat.com/errata/RHSA-2019:0472 (RHSA-2019:0472) vendor-advisory

access.redhat.com/errata/RHSA-2019:0436 (RHSA-2019:0436) vendor-advisory

lists.opensuse.org/...ecurity-announce/2019-03/msg00028.html (openSUSE-SU-2019:0346) vendor-advisory

seclists.org/bugtraq/2019/Mar/27 (20190320 [SECURITY] [DSA 4410-1] openjdk-8 security update) mailing-list

www.debian.org/security/2019/dsa-4410 (DSA-4410) vendor-advisory

access.redhat.com/errata/RHSA-2019:0640 (RHSA-2019:0640) vendor-advisory

lists.debian.org/debian-lts-announce/2019/03/msg00033.html ([debian-lts-announce] 20190327 [SECURITY] [DLA 1732-1] openjdk-7 security update) mailing-list

usn.ubuntu.com/3942-1/ (USN-3942-1) vendor-advisory

usn.ubuntu.com/3949-1/ (USN-3949-1) vendor-advisory

access.redhat.com/errata/RHSA-2019:1238 (RHSA-2019:1238) vendor-advisory

lists.opensuse.org/...ecurity-announce/2019-05/msg00059.html (openSUSE-SU-2019:1439) vendor-advisory

lists.opensuse.org/...ecurity-announce/2019-06/msg00013.html (openSUSE-SU-2019:1500) vendor-advisory

support.hpe.com/...cale=en_US&docId=emr_na-hpesbst03958en_us

cve.org (CVE-2019-2422)

nvd.nist.gov (CVE-2019-2422)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2019-2422

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.