First published: Mon Jul 14 2014(Updated: )
The Diffie-Hellman (DH) key exchange algorithm implementation in the OpenJDK Security component failed to validate public Diffie-Hellman parameters properly. This could allow OpenJDK implementation to accept and use weak parameters, making it possible for attackers to recover the negotiated key.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JRockit | =r27.8.2 | |
Oracle JRockit | =r28.3.2 | |
Oracle JDK | =1.5.0-update65 | |
Oracle JDK | =1.6.0-update75 | |
Oracle JDK | =1.7.0-update60 | |
Oracle JDK | =1.8.0-update5 | |
Oracle JRE | =1.5.0-update65 | |
Oracle JRE | =1.6.0-update75 | |
Oracle JRE | =1.7.0-update60 | |
Oracle JRE | =1.8.0-update5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.