7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.9 Medium
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
71.2%
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html
lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
access.redhat.com/errata/RHBA-2019:0959
access.redhat.com/errata/RHSA-2019:1146
access.redhat.com/errata/RHSA-2019:1163
access.redhat.com/errata/RHSA-2019:1164
access.redhat.com/errata/RHSA-2019:1165
access.redhat.com/errata/RHSA-2019:1166
access.redhat.com/errata/RHSA-2019:1238
access.redhat.com/errata/RHSA-2019:1325
access.redhat.com/errata/RHSA-2019:1518
kc.mcafee.com/corporate/index?page=content&id=SB10285
lists.debian.org/debian-lts-announce/2019/05/msg00011.html
seclists.org/bugtraq/2019/May/75
security.gentoo.org/glsa/201908-10
support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
usn.ubuntu.com/3975-1/
www.debian.org/security/2019/dsa-4453
More
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.9 Medium
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
71.2%