First published: Mon Jul 14 2014(Updated: )
The Diffie-Hellman (DH) key exchange algorithm implementation in the OpenJDK Security component failed to validate public Diffie-Hellman parameters properly. This could allow OpenJDK implementation to accept and use weak parameters, making it possible for attackers to recover the negotiated key.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
BEA JRockit | =r27.8.2 | |
BEA JRockit | =r28.3.2 | |
Oracle JDK 6 | =1.5.0-update65 | |
Oracle JDK 6 | =1.6.0-update75 | |
Oracle JDK 6 | =1.7.0-update60 | |
Oracle JDK 6 | =1.8.0-update5 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update75 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update60 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4263 is considered a moderate severity vulnerability due to its potential to allow attackers to recover the negotiated key in the Diffie-Hellman key exchange.
To fix CVE-2014-4263, upgrade to a version of OpenJDK that addresses the validation of public Diffie-Hellman parameters.
CVE-2014-4263 affects specific versions of Oracle JDK and JRE, including versions up to 1.8.0-update5.
The impact of CVE-2014-4263 allows for the acceptance of weak Diffie-Hellman parameters, potentially compromising the key exchange process.
There are no official workarounds for CVE-2014-4263; the recommended action is to apply the appropriate software updates.