First published: Tue Jul 16 2019(Updated: )
Last updated 24 July 2024
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.7.0-update221 | |
Oracle JDK | =1.8.0-update212 | |
Oracle JDK | =11.0.3 | |
Oracle JRE | =1.7.0-update221 | |
Oracle JRE | =1.8.0-update212 | |
Oracle JRE | =11.0.3 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =16.04 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
McAfee ePolicy Orchestrator | =5.9.0 | |
McAfee ePolicy Orchestrator | =5.9.1 | |
McAfee ePolicy Orchestrator | =5.10.0 | |
McAfee ePolicy Orchestrator | =5.10.0-update_1 | |
McAfee ePolicy Orchestrator | =5.10.0-update_2 | |
McAfee ePolicy Orchestrator | =5.10.0-update_3 | |
McAfee ePolicy Orchestrator | =5.10.0-update_4 | |
Hp Xp7 Command View | <8.7.0-00 | |
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.25+9-1~deb11u1 11.0.25+9-1 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2745 has a severity of medium.
Java SE versions 7u221, 8u212, and 11.0.3 are affected by CVE-2019-2745.
CVE-2019-2745 allows an unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java.
The recommended remedy for CVE-2019-2745 in the openjdk-11 package (Debian) is to update to version 11.0.16+8-1~deb10u1 or higher.
To protect your system from CVE-2019-2745, update your Java SE installation to a version that is not affected by the vulnerability.