First published: Mon Apr 18 2016(Updated: )
It was discovered that the JAXP (Java API for XML Processing) component of OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. A specially-crafted XML input could cause a Java application to use an excessive amount of memory when parsed.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6.0-update113 | |
Oracle JDK 6 | =1.7.0-update99 | |
Oracle JDK 6 | =1.8.0-update77 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update113 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update99 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update77 | |
BEA JRockit | =r28.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3425 is rated as medium severity due to its potential to cause excessive memory consumption.
To fix CVE-2016-3425, upgrade to the latest version of OpenJDK or Oracle JDK that addresses this vulnerability.
CVE-2016-3425 affects Oracle JDK and JRE versions 1.6.0-update113, 1.7.0-update99, and 1.8.0-update77.
CVE-2016-3425 can lead to denial of service due to excessive memory usage when processing specially-crafted XML input.
CVE-2016-3425 specifically affects Oracle's OpenJDK and JRE implementations, including BEA JRockit.