Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 15 |
CVE-ID | CVE-2022-21549 CVE-2022-40433 CVE-2023-21830 CVE-2023-21835 CVE-2023-21843 CVE-2023-21930 CVE-2023-21937 CVE-2023-21938 CVE-2023-21939 CVE-2023-21954 CVE-2023-21967 CVE-2023-21968 CVE-2023-22006 CVE-2023-22041 CVE-2023-22045 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #9 is available. |
Vulnerable software |
openEuler Operating systems & Components / Operating system java-latest-openjdk-headless Operating systems & Components / Operating system package or component java-latest-openjdk-src Operating systems & Components / Operating system package or component java-latest-openjdk-javadoc Operating systems & Components / Operating system package or component java-latest-openjdk-jmods Operating systems & Components / Operating system package or component java-latest-openjdk-demo Operating systems & Components / Operating system package or component java-latest-openjdk-devel Operating systems & Components / Operating system package or component java-latest-openjdk-javadoc-zip Operating systems & Components / Operating system package or component java-latest-openjdk Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 15 vulnerabilities.
EUVDB-ID: #VU65498
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-21549
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82255
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-40433
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in within the ciMethodBlocks::make_block_at() function. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU71288
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-21830
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Serialization component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU71287
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-21835
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the JSSE component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU71289
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-21843
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Sound component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75260
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-21930
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the JSSE component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75267
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-21937
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Networking component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75265
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-21938
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75264
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2023-21939
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Swing component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU75262
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-21954
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75261
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-21967
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the JSSE component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75266
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-21968
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78416
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-22006
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Networking component in Oracle GraalVM for JDK. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78410
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-22041
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM for JDK. A local non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78413
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-22045
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM for JDK. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
java-latest-openjdk-headless: before 20.0.2.9-2.rolling
java-latest-openjdk-src: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc: before 20.0.2.9-2.rolling
java-latest-openjdk-jmods: before 20.0.2.9-2.rolling
java-latest-openjdk-demo: before 20.0.2.9-2.rolling
java-latest-openjdk-devel: before 20.0.2.9-2.rolling
java-latest-openjdk-javadoc-zip: before 20.0.2.9-2.rolling
java-latest-openjdk: before 20.0.2.9-2.rolling
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1600
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.