First published: Mon Jan 13 2020(Updated: )
A flaw was found in the way the GssKrb5Base class in the Security component of OpenJDK validated properties of SASL messages included in Kerberos GSSAPI, omitting required token checks. An remote attacker with ability to manipulate network traffic between server and client using Kerberos GSSAPI could possibly perform message modification that would not be detected during message decoding.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b07-1.el6_10 | 1.8.0-openjdk-1:1.8.0.242.b07-1.el6_10 |
redhat/java | <1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el6_10 | 1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el6_10 |
redhat/java | <1.7.1-ibm-1:1.7.1.4.70-1jpp.1.el6_10 | 1.7.1-ibm-1:1.7.1.4.70-1jpp.1.el6_10 |
redhat/java | <11-openjdk-1:11.0.6.10-1.el7_7 | 11-openjdk-1:11.0.6.10-1.el7_7 |
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b08-0.el7_7 | 1.8.0-openjdk-1:1.8.0.242.b08-0.el7_7 |
redhat/java | <1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el7_7 | 1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el7_7 |
redhat/java | <1.7.1-ibm-1:1.7.1.4.70-1jpp.1.el7 | 1.7.1-ibm-1:1.7.1.4.70-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-1:1.8.0.6.20-1jpp.1.el7 | 1.8.0-ibm-1:1.8.0.6.20-1jpp.1.el7 |
redhat/java | <11-openjdk-1:11.0.6.10-0.el8_1 | 11-openjdk-1:11.0.6.10-0.el8_1 |
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b08-0.el8_1 | 1.8.0-openjdk-1:1.8.0.242.b08-0.el8_1 |
redhat/java | <1.8.0-ibm-1:1.8.0.6.15-1.el8_2 | 1.8.0-ibm-1:1.8.0.6.15-1.el8_2 |
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b08-0.el8_0 | 1.8.0-openjdk-1:1.8.0.242.b08-0.el8_0 |
redhat/java | <11-openjdk-1:11.0.6.10-0.el8_0 | 11-openjdk-1:11.0.6.10-0.el8_0 |
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.25~5ea-1 | |
debian/openjdk-8 | 8u422-b05-1 | |
Oracle JDK 6 | =1.7.0-update241 | |
Oracle JDK 6 | =1.8.0-update231 | |
Oracle JDK 6 | =11.0.5 | |
Oracle JDK 6 | =13.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update_241 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update_231 | |
Oracle Java Runtime Environment (JRE) | =11.0.5 | |
Oracle Java Runtime Environment (JRE) | =13.0.1 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux eus | =8.1 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise linux tus | =7.7 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
OpenJDK 17 | =7 | |
OpenJDK 17 | =7-update241 | |
OpenJDK 17 | =7-update80 | |
OpenJDK 17 | =7-update85 | |
OpenJDK 17 | =8 | |
OpenJDK 17 | =8-update102 | |
OpenJDK 17 | =8-update112 | |
OpenJDK 17 | =8-update152 | |
OpenJDK 17 | =8-update162 | |
OpenJDK 17 | =8-update172 | |
OpenJDK 17 | =8-update192 | |
OpenJDK 17 | =8-update20 | |
OpenJDK 17 | =8-update202 | |
OpenJDK 17 | =8-update212 | |
OpenJDK 17 | =8-update222 | |
OpenJDK 17 | =8-update232 | |
OpenJDK 17 | =8-update40 | |
OpenJDK 17 | =8-update60 | |
OpenJDK 17 | =8-update66 | |
OpenJDK 17 | =8-update72 | |
OpenJDK 17 | =8-update92 | |
OpenJDK 17 | =11 | |
OpenJDK 17 | =11.0.1 | |
OpenJDK 17 | =11.0.2 | |
OpenJDK 17 | =11.0.3 | |
OpenJDK 17 | =11.0.4 | |
OpenJDK 17 | =11.0.5 | |
OpenJDK 17 | =13 | |
OpenJDK 17 | =13.0.1 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
openSUSE | =15.1 | |
Trellix ePolicy Orchestrator | =5.9.0 | |
Trellix ePolicy Orchestrator | =5.9.1 | |
Trellix ePolicy Orchestrator | =5.10.0 | |
Trellix ePolicy Orchestrator | =5.10.0-update_1 | |
Trellix ePolicy Orchestrator | =5.10.0-update_2 | |
Trellix ePolicy Orchestrator | =5.10.0-update_3 | |
Trellix ePolicy Orchestrator | =5.10.0-update_4 | |
Trellix ePolicy Orchestrator | =5.10.0-update_5 | |
Trellix ePolicy Orchestrator | =5.10.0-update_6 | |
netapp active iq unified manager windows | >=7.3 | |
NetApp Active IQ Unified Manager for VMware vSphere | >=9.5 | |
netapp e-series performance analyzer | ||
NetApp E-Series SANtricity Management for VMware vCenter | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.60.3 | |
netapp e-series santricity storage manager | ||
netapp e-series santricity Web services Web services proxy | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
netapp santricity unified manager | ||
NetApp SteelStore | ||
Oracle JDK | =1.7.0-update241 | |
Oracle JDK | =1.8.0-update231 | |
Oracle JDK | =11.0.5 | |
Oracle JDK | =13.0.1 | |
Oracle Java SE JDK and JRE | =1.7.0-update_241 | |
Oracle Java SE JDK and JRE | =1.8.0-update_231 | |
Oracle Java SE JDK and JRE | =11.0.5 | |
Oracle Java SE JDK and JRE | =13.0.1 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux | =7.7 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
SUSE openSUSE | =15.1 | |
NetApp Active IQ Unified Manager | >=7.3 | |
NetApp E-Series Performance Analyzer | ||
NetApp E-Series SANtricity Storage Manager | ||
NetApp E-Series SANtricity Web Services | ||
NetApp SANtricity Unified Manager | ||
NetApp SteelStore Cloud Integrated Storage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-2590 has been assigned a severity rating of high due to the potential for remote exploitation.
To fix CVE-2020-2590, update to the patched versions of OpenJDK specified in your distribution's security advisories.
CVE-2020-2590 affects various versions of OpenJDK, specifically the Java packages from Red Hat and Debian.
Yes, CVE-2020-2590 can be exploited by an attacker with access to manipulate network traffic, making it a remote attack vulnerability.
Vulnerable versions of OpenJDK related to CVE-2020-2590 include multiple versions of 1.7, 1.8, and 11 across various distributions.