Buffer Overflow Affecting openjdk-jre package, versions [1.7.0, 1.7.0_261) [1.8.0, 1.8.0_251) [11.0.0, 11.0.7) [14.0.0, 14.0.1)
Snyk CVSS
Attack Complexity
High
User Interaction
Required
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
0.16% (52nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UPSTREAM-OPENJDKJRE-565491
- published 15 Apr 2020
- disclosed 15 Apr 2020
- credit Nils Emmerich of ERNW
Introduced: 15 Apr 2020
CVE-2020-2803 Open this link in a new tabHow to fix?
Upgrade openjdk-jre
to version 7.0.261, 8.0.251, 11.0.7, 14.0.1 or higher.
Overview
openjdk-jre is a free and open-source implementation of the Java Platform, Standard Edition (Java SE).
Affected versions of this package are vulnerable to Buffer Overflow. A flaw was found in the boundary checks in the java.nio buffer classes in the Libraries component of OpenJDK, where it is bypassed in certain cases. This flaw allows an untrusted Java application or applet o bypass Java sandbox restrictions.