First published: Mon Jul 14 2014(Updated: )
It was discovered that the RSA algorithm in the OpenJDK Security component did not sufficiently preform "blinding" while performing operations using private keys. An attacker able to measure timing differences of those operations could possibly leak information about the keys used.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.5.0-update65 | |
Oracle JDK 6 | =1.6.0-update75 | |
Oracle JDK 6 | =1.7.0-update60 | |
Oracle JDK 6 | =1.8.0-update5 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update75 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update60 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update5 | |
BEA JRockit | =r27.8.2 | |
BEA JRockit | =r28.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4244 is considered a high severity vulnerability due to its potential to expose sensitive private key information.
To fix CVE-2014-4244, update your version of the Oracle JDK or JRE to the latest patched release.
CVE-2014-4244 affects Oracle JDK 1.5.0-update65, 1.6.0-update75, 1.7.0-update60, and 1.8.0-update5, as well as corresponding JRE and BEA JRockit versions.
CVE-2014-4244 potentially allows an attacker to exploit timing differences in RSA private key operations to leak key information.
As of now, there are no publicly known exploits specifically targeting CVE-2014-4244, but the vulnerability itself poses a risk.