First published: Sun Jul 12 2015(Updated: )
A flaw was found in the way the Libraries component of OpenJDK verified OCSP (Online Certificate Status Protocol) response. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity. This could allow a Java application to accept a revoked X.509 certificate as valid if it was presented with an OCSP response generated before certificate revocation.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JRockit | =r28.3.6 | |
Oracle JDK | =1.6.0-update95 | |
Oracle JDK | =1.7.0-update75 | |
Oracle JDK | =1.7.0-update80 | |
Oracle JDK | =1.8.0-update_33 | |
Oracle JDK | =1.8.0-update45 | |
Oracle JRE | =1.6.0-update_95 | |
Oracle JRE | =1.7.0-update_75 | |
Oracle JRE | =1.7.0-update_80 | |
Oracle JRE | =1.8.0-update_33 | |
Oracle JRE | =1.8.0-update_45 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2015-4748.
The severity rating of CVE-2015-4748 is 7.6 (high).
Oracle Java SE 6u95, 7u80, and 8u45 are affected by CVE-2015-4748.
CVE-2015-4748 can affect confidentiality, integrity, and availability of a system.
You can find more information about CVE-2015-4748 on the official Oracle website and the Red Hat website.