First published: Tue Jan 17 2017(Updated: )
A covert timing channel flaw was found in the ECDSA implementation in the Libraries component of OpenJDK. A remote attacker able to make a Java application generate ECDSA signatures on demand could possibly use this flaw to extract certain information about the key use via a timing side channel.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.7-update_121 | |
Oracle JDK 6 | =1.8-update_111 | |
Oracle JDK 6 | =1.8-update_112 | |
Oracle Java Runtime Environment (JRE) | =1.7-update_121 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_111 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_112 | |
debian/openjdk-8 | 8u442-ga-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5549 is categorized as a medium severity vulnerability due to its potential to exploit timing channels.
To remediate CVE-2016-5549, you should upgrade to OpenJDK 8 or later versions, specifically version 8u442-ga-2 or newer.
CVE-2016-5549 affects specific versions of Oracle JDK and JRE, specifically 1.7-update_121, 1.8-update_111, and 1.8-update_112.
Yes, CVE-2016-5549 can potentially be exploited by a remote attacker who is able to trigger ECDSA signature generation.
CVE-2016-5549 leverages a covert timing channel to potentially leak information regarding key usage.