3.7 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
Openjdk is vulnerable to Sandbox Restrictions Bypass. It is due to unexpected exception raised by DerValue.equals() which allows an attacker to bypass the sandbox restrictions.
lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
access.redhat.com/errata/RHSA-2020:2968
access.redhat.com/security/updates/classification/#important
kc.mcafee.com/corporate/index?page=content&id=SB10332
lists.debian.org/debian-lts-announce/2020/08/msg00021.html
lists.fedoraproject.org/archives/list/[email protected]/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
lists.fedoraproject.org/archives/list/[email protected]/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
security.gentoo.org/glsa/202008-24
security.gentoo.org/glsa/202209-15
security.netapp.com/advisory/ntap-20200717-0005/
usn.ubuntu.com/4453-1/
www.debian.org/security/2020/dsa-4734
www.oracle.com/security-alerts/cpujul2020.html
3.7 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P