CVE-2021-35603

Name
CVE-2021-35603
Description
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
NVD Severity
low
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://www.oracle.com/security-alerts/cpuoct2021.html
CONFIRM https://security.netapp.com/advisory/ntap-20211022-0004/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
vendor-advisory https://www.debian.org/security/2021/dsa-5000
mailing-list https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
vendor-advisory https://www.debian.org/security/2021/dsa-5012
vendor-advisory https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
vendor-advisory https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
vendor-advisory https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
vendor-advisory https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20240621-0006/

Match rules

CPE URI Source package Min version Max version
java-se-jdk-and-jre == Java SE:7u311 == Java SE:7u311
java-se-jdk-and-jre == Java SE:8u301 == Java SE:8u301
java-se-jdk-and-jre == Java SE:11.0.12 == Java SE:11.0.12
java-se-jdk-and-jre == Java SE:17 == Java SE:17
java-se-jdk-and-jre == Oracle GraalVM Enterprise Edition:20.3.3 == Oracle GraalVM Enterprise Edition:20.3.3
java-se-jdk-and-jre == Oracle GraalVM Enterprise Edition:21.2.0 == Oracle GraalVM Enterprise Edition:21.2.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openjdk7 3.16-community 7.321.2.6.28-r0 Timo Teras <timo.teras@iki.fi> fixed