First published: Mon Jul 13 2015(Updated: )
It was discovered that the Elliptic Curve (EC) cryptography code as used in Mozilla NSS (Network Security Services) library and OpenJDK JCE (Java Cryptography Extension) component failed to properly validate EC parameters as used in ECDH_Derive() function, which performs ECDH (Elliptic Curve Diffie-Hellman) key derivation. A remote attacker could use this flaw to disclose sensitive information. The OpenJDK packages as shipped with Red Hat Enterprise Linux 5, 6 and 7 do not build the affected EC code and are therefore not directly affected. Future versions may provide EC support via NSS, see e.g. <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - ECC decode refactoring needed to build OpenJDK SunEC provider for ECC support" href="show_bug.cgi?id=1075702">bug 1075702</a>.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.7.0-update75 | |
Oracle JDK | =1.7.0-update80 | |
Oracle JDK | =1.8.0-update_33 | |
Oracle JDK | =1.8.0-update45 | |
Oracle JRE | =1.7.0-update_75 | |
Oracle JRE | =1.7.0-update_80 | |
Oracle JRE | =1.8.0-update_33 | |
Oracle JRE | =1.8.0-update_45 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2015-2613.
Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 are affected.
A remote attacker can exploit this vulnerability to affect confidentiality via vectors related to JCE.
The severity level of CVE-2015-2613 is medium.
Yes, there are recommended fixes available for this vulnerability. Please refer to the provided references for more information.