RHEL 8:java-11-openjdk (RHSA-2020: 1514)

medium Nessus 插件 ID 135861
全新!插件严重性现在使用 CVSS v3

计算的插件严重性默认已更新为使用 CVSS v3。没有 CVSS v3 分数的插件将回退到 CVSS v2 来计算严重性。可以在设置下拉列表中切换严重性显示首选项。

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 8 主机上安装的程序包受到 RHSA-2020: 1514 公告中提及的多个漏洞的影响。

- OpenJDK:RegExpScanner 中的正则表达式语法错误检查错放(脚本,8223898)(CVE-2020-2754)

- OpenJDK:正则表达式解析器中的空字符串节点处理错误(脚本,8223904)(CVE-2020-2755)

- OpenJDK:在反序列化期间,未正确处理对未初始化类扫描符的引用(序列化,8224541)(CVE-2020-2756)

- OpenJDK:ObjectStreamClass 中存在未捕获的 InstantiationError 异常(序列化,8224549)(CVE-2020-2757)

- OpenJDK:在 TLS 握手期间,未正确处理证书消息(JSSE,8232581)(CVE-2020-2767)

- OpenJDK:DOMKeyInfoFactory 和 DOMXMLSignatureFactory 引发意外异常(安全,8231415)(CVE-2020-2773)

- OpenJDK:TLS 的算法限制执行不完整(JSSE,8232424)(CVE-2020-2778)

- OpenJDK:重新使用新连接的单个 TLS 会话(JSSE,8234408)(CVE-2020-2781)

- OpenJDK:在 HttpServer 的 HTTP 标头中注入 CRLF(轻量级 HTTP 服务器,8234825)(CVE-2020-2800)

- OpenJDK:NIO 缓冲区中的边界检查不正确(库,8234841)(CVE-2020-2803)

- OpenJDK:MethodType.readObject() 中的类型检查不正确(库,8235274)(CVE-2020-2805)

- OpenJDK:在 TLS 握手完成之前接受应用程序数据(JSSE,8235691)(CVE-2020-2816)

- OpenJDK:Scanner 中的正则表达式 DoS(并发,8236201)(CVE-2020-2830)

请注意,Nessus 尚未测试此问题,而是只依靠应用程序自我报告的版本号。

解决方案

更新受影响的程序包。

另见

https://cwe.mitre.org/data/definitions/20.html

https://cwe.mitre.org/data/definitions/113.html

https://cwe.mitre.org/data/definitions/119.html

https://cwe.mitre.org/data/definitions/400.html

https://cwe.mitre.org/data/definitions/248.html

https://cwe.mitre.org/data/definitions/327.html

https://cwe.mitre.org/data/definitions/185.html

https://access.redhat.com/security/cve/CVE-2020-2756

https://access.redhat.com/security/cve/CVE-2020-2757

https://access.redhat.com/security/cve/CVE-2020-2773

https://access.redhat.com/security/cve/CVE-2020-2781

https://access.redhat.com/security/cve/CVE-2020-2800

https://access.redhat.com/security/cve/CVE-2020-2803

https://access.redhat.com/security/cve/CVE-2020-2805

https://access.redhat.com/security/cve/CVE-2020-2830

https://access.redhat.com/security/cve/CVE-2020-2754

https://access.redhat.com/security/cve/CVE-2020-2755

https://cwe.mitre.org/data/definitions/358.html

https://access.redhat.com/errata/RHSA-2020:1514

https://access.redhat.com/security/cve/CVE-2020-2767

https://access.redhat.com/security/cve/CVE-2020-2778

https://access.redhat.com/security/cve/CVE-2020-2816

https://bugzilla.redhat.com/1823199

https://bugzilla.redhat.com/1823200

https://bugzilla.redhat.com/1823215

https://bugzilla.redhat.com/1823216

https://bugzilla.redhat.com/1823224

https://bugzilla.redhat.com/1823527

https://bugzilla.redhat.com/1823542

https://bugzilla.redhat.com/1823694

https://bugzilla.redhat.com/1823844

https://bugzilla.redhat.com/1823853

https://bugzilla.redhat.com/1823879

https://bugzilla.redhat.com/1823947

https://bugzilla.redhat.com/1823960

插件详情

严重性: Medium

ID: 135861

文件名: redhat-RHSA-2020-1514.nasl

版本: 1.6

类型: local

代理: unix

发布时间: 2020/4/21

最近更新时间: 2021/10/13

依存关系: ssh_get_info.nasl, redhat_repos.nasl

风险信息

CVSS 分数来源: CVE-2020-2800

VPR

风险因素: Medium

分数: 6.5

CVSS v2

风险因素: Medium

基本分数: 5.8

时间分数: 4.3

矢量: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

时间矢量: CVSS2#E:U/RL:OF/RC:C

CVSS v3

风险因素: Medium

基本分数: 4.8

时间分数: 4.2

矢量: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*, cpe:2.3:o:redhat:rhel_eus:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:rhel_aus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:rhel_e4s:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:rhel_eus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:rhel_tus:8.2:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:java-11-openjdk:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:java-11-openjdk-demo:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:java-11-openjdk-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:java-11-openjdk-headless:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:java-11-openjdk-javadoc:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:java-11-openjdk-javadoc-zip:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:java-11-openjdk-jmods:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:java-11-openjdk-src:*:*:*:*:*:*:*, cpe:2.3:o:redhat:rhel_e4s:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:rhel_eus:8.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:rhel_aus:8.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:rhel_e4s:8.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:rhel_tus:8.4:*:*:*:*:*:*:*

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2020/4/21

漏洞发布日期: 2020/4/14

参考资料信息

CVE: CVE-2020-2754, CVE-2020-2755, CVE-2020-2756, CVE-2020-2757, CVE-2020-2767, CVE-2020-2773, CVE-2020-2778, CVE-2020-2781, CVE-2020-2800, CVE-2020-2803, CVE-2020-2805, CVE-2020-2816, CVE-2020-2830

CWE: 119, 20, 400, 327, 358, 113, 248, 185

RHSA: 2020:1514