First published: Tue Jan 17 2017(Updated: )
A covert timing channel flaw was found in the DSA implementation in the Libraries component of OpenJDK. A remote attacker able to make a Java application generate DSA signatures on demand could possibly use this flaw to extract certain information about the used key via a timing side channel.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6-update_131 | |
Oracle JDK 6 | =1.7-update_121 | |
Oracle JDK 6 | =1.8-update_111 | |
Oracle JDK 6 | =1.8-update_112 | |
Oracle Java Runtime Environment (JRE) | =1.6-update_131 | |
Oracle Java Runtime Environment (JRE) | =1.7-update_121 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_111 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_112 | |
debian/openjdk-8 | 8u442-ga-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5548 is classified as a medium-severity vulnerability due to the risk of information disclosure via timing attacks.
To fix CVE-2016-5548, update to the latest patched version of OpenJDK or Oracle JDK/JRE as specified in the vendor advisories.
CVE-2016-5548 affects OpenJDK 8u432-b06-2 and several specific versions of Oracle JDK and JRE including 1.6-update_131, 1.7-update_121, and 1.8-update_111 and 1.8-update_112.
Yes, CVE-2016-5548 can be exploited remotely if an attacker can induce a Java application to generate DSA signatures.
CVE-2016-5548 poses a risk of exposure of sensitive cryptographic key information through a covert timing channel.