First published: Tue Jan 17 2017(Updated: )
It was discovered that the ECDSASignature class in the Libraries component of OpenJDK accepted signatures using non-canonical DER encoding. This could cause a Java application to accept signature in an incorrect format not accepted by other cryptographic tools.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6-update_131 | |
Oracle JDK 6 | =1.7-update_121 | |
Oracle JDK 6 | =1.8-update_111 | |
Oracle JDK 6 | =1.8-update_112 | |
Oracle Java Runtime Environment (JRE) | =1.6-update_131 | |
Oracle Java Runtime Environment (JRE) | =1.7-update_121 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_111 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_112 | |
BEA JRockit | =r28.3.12 | |
debian/openjdk-8 | 8u442-ga-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5546 is classified as a medium severity vulnerability.
To fix CVE-2016-5546, update your OpenJDK or JDK/JRE to the latest version available for your system.
CVE-2016-5546 affects specific versions of Oracle JDK 6, 7, 8, and certain versions of OpenJDK and JRE.
CVE-2016-5546 could lead to Java applications accepting malformed signatures that may compromise integrity and security.
If your application uses affected versions of Java and relies on the ECDSASignature class, it may be at risk due to CVE-2016-5546.