CVE-2022-21626
OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Una vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Security). Las versiones soportadas que están afectadas son Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 y 22.2.0. Una vulnerabilidad fácilmente explotable permite a un atacante no autenticado con acceso a la red por medio de HTTPS comprometer a Oracle Java SE, Oracle GraalVM Enterprise Edition. Los ataques con éxito de esta vulnerabilidad pueden resultar en la capacidad no autorizada de causar una denegación parcial de servicio (DOS parcial) de Oracle Java SE, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad es aplicada a las implantaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start con sandbox o applets Java con sandbox, que cargan y ejecutan código que no es confiable (por ejemplo, código que viene de Internet) y dependen del sandbox de Java para la seguridad. Esta vulnerabilidad también puede ser explotada mediante el uso de APIs en el componente especificado, por ejemplo, mediante un servicio web que suministra datos a las APIs. CVSS 3.1 Puntuación Base 5.3 (Impactos en la Disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-11-15 CVE Reserved
- 2022-10-18 CVE Published
- 2024-03-30 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
https://security.gentoo.org/glsa/202401-25 | ||
https://security.netapp.com/advisory/ntap-20221028-0012 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.oracle.com/security-alerts/cpuoct2022.html | 2024-01-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 20.3.7 Search vendor "Oracle" for product "Graalvm" and version "20.3.7" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 21.3.3 Search vendor "Oracle" for product "Graalvm" and version "21.3.3" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 22.2.0 Search vendor "Oracle" for product "Graalvm" and version "22.2.0" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 1.8.0 Search vendor "Oracle" for product "Jdk" and version "1.8.0" | update341 |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 1.8.0 Search vendor "Oracle" for product "Jdk" and version "1.8.0" | update345, enterprise_performance_pack |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 11.0.16.1 Search vendor "Oracle" for product "Jdk" and version "11.0.16.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 1.8.0 Search vendor "Oracle" for product "Jre" and version "1.8.0" | update341 |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 1.8.0 Search vendor "Oracle" for product "Jre" and version "1.8.0" | update345, enterprise_performance_pack |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 11.0.16.1 Search vendor "Oracle" for product "Jre" and version "11.0.16.1" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 35 Search vendor "Fedoraproject" for product "Fedora" and version "35" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 36 Search vendor "Fedoraproject" for product "Fedora" and version "36" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | 7-mode Transition Tool Search vendor "Netapp" for product "7-mode Transition Tool" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Cloud Insights Acquisition Unit Search vendor "Netapp" for product "Cloud Insights Acquisition Unit" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Cloud Secure Agent Search vendor "Netapp" for product "Cloud Secure Agent" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | E-series Santricity Os Controller Search vendor "Netapp" for product "E-series Santricity Os Controller" | >= 11.0 <= 11.70.2 Search vendor "Netapp" for product "E-series Santricity Os Controller" and version " >= 11.0 <= 11.70.2" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | E-series Santricity Storage Manager Search vendor "Netapp" for product "E-series Santricity Storage Manager" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | E-series Santricity Unified Manager Search vendor "Netapp" for product "E-series Santricity Unified Manager" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Oncommand Insight Search vendor "Netapp" for product "Oncommand Insight" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Oncommand Workflow Automation Search vendor "Netapp" for product "Oncommand Workflow Automation" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Santricity Storage Plugin Search vendor "Netapp" for product "Santricity Storage Plugin" | - | vcenter |
Affected
| ||||||
Netapp Search vendor "Netapp" | Santricity Web Services Proxy Search vendor "Netapp" for product "Santricity Web Services Proxy" | - | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 6.49 Search vendor "Azul" for product "Zulu" and version "6.49" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 7.56 Search vendor "Azul" for product "Zulu" and version "7.56" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 8.64 Search vendor "Azul" for product "Zulu" and version "8.64" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 11.58 Search vendor "Azul" for product "Zulu" and version "11.58" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 13.50 Search vendor "Azul" for product "Zulu" and version "13.50" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 15.42 Search vendor "Azul" for product "Zulu" and version "15.42" | - |
Affected
|