First published: Tue Apr 14 2020(Updated: )
A flaw was found in the way the TLS implementation in the JSSE component of OpenJDK handled unexpected Certificate messages during the TLS handshake. This could possibly allow an attacker to tamper with certificate verification performed during the handshake.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <11-openjdk-1:11.0.7.10-4.el7_8 | 11-openjdk-1:11.0.7.10-4.el7_8 |
redhat/java | <11-openjdk-1:11.0.7.10-1.el8_1 | 11-openjdk-1:11.0.7.10-1.el8_1 |
redhat/java | <11-openjdk-1:11.0.7.10-1.el8_0 | 11-openjdk-1:11.0.7.10-1.el8_0 |
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.25~5ea-1 | |
Oracle JDK 6 | =11.0.6 | |
Oracle JDK 6 | =14.0.0 | |
Oracle Java Runtime Environment (JRE) | =11.0.6 | |
Oracle Java Runtime Environment (JRE) | =14.0.0 | |
OpenJDK 17 | >=11<=11.0.6 | |
OpenJDK 17 | >=13<=13.0.2 | |
OpenJDK 17 | =7 | |
OpenJDK 17 | =7-update1 | |
OpenJDK 17 | =7-update10 | |
OpenJDK 17 | =7-update101 | |
OpenJDK 17 | =7-update11 | |
OpenJDK 17 | =7-update111 | |
OpenJDK 17 | =7-update121 | |
OpenJDK 17 | =7-update13 | |
OpenJDK 17 | =7-update131 | |
OpenJDK 17 | =7-update141 | |
OpenJDK 17 | =7-update15 | |
OpenJDK 17 | =7-update151 | |
OpenJDK 17 | =7-update161 | |
OpenJDK 17 | =7-update17 | |
OpenJDK 17 | =7-update171 | |
OpenJDK 17 | =7-update181 | |
OpenJDK 17 | =7-update191 | |
OpenJDK 17 | =7-update2 | |
OpenJDK 17 | =7-update201 | |
OpenJDK 17 | =7-update21 | |
OpenJDK 17 | =7-update211 | |
OpenJDK 17 | =7-update221 | |
OpenJDK 17 | =7-update231 | |
OpenJDK 17 | =7-update241 | |
OpenJDK 17 | =7-update25 | |
OpenJDK 17 | =7-update251 | |
OpenJDK 17 | =7-update3 | |
OpenJDK 17 | =7-update4 | |
OpenJDK 17 | =7-update40 | |
OpenJDK 17 | =7-update45 | |
OpenJDK 17 | =7-update5 | |
OpenJDK 17 | =7-update51 | |
OpenJDK 17 | =7-update55 | |
OpenJDK 17 | =7-update6 | |
OpenJDK 17 | =7-update60 | |
OpenJDK 17 | =7-update65 | |
OpenJDK 17 | =7-update67 | |
OpenJDK 17 | =7-update7 | |
OpenJDK 17 | =7-update72 | |
OpenJDK 17 | =7-update76 | |
OpenJDK 17 | =7-update80 | |
OpenJDK 17 | =7-update85 | |
OpenJDK 17 | =7-update9 | |
OpenJDK 17 | =7-update91 | |
OpenJDK 17 | =7-update95 | |
OpenJDK 17 | =7-update97 | |
OpenJDK 17 | =7-update99 | |
OpenJDK 17 | =8 | |
OpenJDK 17 | =8-update101 | |
OpenJDK 17 | =8-update102 | |
OpenJDK 17 | =8-update11 | |
OpenJDK 17 | =8-update111 | |
OpenJDK 17 | =8-update112 | |
OpenJDK 17 | =8-update121 | |
OpenJDK 17 | =8-update131 | |
OpenJDK 17 | =8-update141 | |
OpenJDK 17 | =8-update151 | |
OpenJDK 17 | =8-update152 | |
OpenJDK 17 | =8-update161 | |
OpenJDK 17 | =8-update162 | |
OpenJDK 17 | =8-update171 | |
OpenJDK 17 | =8-update172 | |
OpenJDK 17 | =8-update181 | |
OpenJDK 17 | =8-update191 | |
OpenJDK 17 | =8-update192 | |
OpenJDK 17 | =8-update20 | |
OpenJDK 17 | =8-update201 | |
OpenJDK 17 | =8-update202 | |
OpenJDK 17 | =8-update211 | |
OpenJDK 17 | =8-update212 | |
OpenJDK 17 | =8-update221 | |
OpenJDK 17 | =8-update231 | |
OpenJDK 17 | =8-update241 | |
OpenJDK 17 | =8-update25 | |
OpenJDK 17 | =8-update31 | |
OpenJDK 17 | =8-update40 | |
OpenJDK 17 | =8-update45 | |
OpenJDK 17 | =8-update5 | |
OpenJDK 17 | =8-update51 | |
OpenJDK 17 | =8-update60 | |
OpenJDK 17 | =8-update65 | |
OpenJDK 17 | =8-update66 | |
OpenJDK 17 | =8-update71 | |
OpenJDK 17 | =8-update72 | |
OpenJDK 17 | =8-update73 | |
OpenJDK 17 | =8-update74 | |
OpenJDK 17 | =8-update77 | |
OpenJDK 17 | =8-update91 | |
OpenJDK 17 | =8-update92 | |
OpenJDK 17 | =14 | |
NetApp 7-Mode Transition Tool | ||
NetApp Active IQ Unified Manager for VMware vSphere | ||
netapp active iq unified manager windows | ||
netapp cloud backup | ||
netapp cloud secure agent | ||
netapp e-series performance analyzer | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.70.2 | |
netapp e-series santricity Web services Web services proxy | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
netapp plug-in for symantec netbackup | ||
netapp santricity unified manager | ||
netapp snapmanager sap | ||
netapp snapmanager Oracle | ||
NetApp SteelStore | ||
netapp storagegrid | >=9.0.0<=9.0.4 | |
netapp storagegrid | ||
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
Debian GNU/Linux | =10.0 | |
openSUSE | =15.1 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-2767 has a CVSS score of 7.5, indicating it is of high severity.
To fix CVE-2020-2767, upgrade to a patched version of OpenJDK or Oracle JDK as specified in the vulnerability advisory.
Yes, CVE-2020-2767 can be exploited remotely in scenarios where an attacker can intercept and manipulate TLS handshake messages.
CVE-2020-2767 affects OpenJDK versions 11.0.6 and earlier; specific versions include 11-openjdk-1:11.0.7.10-4.el7_8 and 11-openjdk-1:11.0.7.10-1.el8_1.
Yes, CVE-2020-2767 affects multiple platforms including Red Hat and Debian distributions, particularly with the specified vulnerable OpenJDK packages.