First published: Tue Jan 17 2017(Updated: )
It was discovered that the URLStreamHandler class in the Networking component of OpenJDK failed to properly parse user info from the URL. A remote attacker could cause Java application to incorrectly parse attacker provided URL and interpret it differently from other applications processing the same URL.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-8 | 8u432-b06-2 | |
Oracle JDK 6 | =1.6-update_131 | |
Oracle JDK 6 | =1.7-update_121 | |
Oracle JDK 6 | =1.8-update_111 | |
Oracle JDK 6 | =1.8-update_112 | |
Oracle Java Runtime Environment (JRE) | =1.6-update_131 | |
Oracle Java Runtime Environment (JRE) | =1.7-update_121 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_111 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_112 | |
BEA JRockit | =r28.3.12 | |
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5552 has been assigned a medium severity rating due to its potential to lead to URL parsing issues in Java applications.
To fix CVE-2016-5552, update your OpenJDK or Oracle JDK to the latest version that addresses this vulnerability.
CVE-2016-5552 affects multiple versions of OpenJDK and Oracle JDK, including versions 1.6, 1.7, and 1.8, as well as Android devices using Java components.
The impact of CVE-2016-5552 is that a remote attacker could exploit improper parsing of URLs, potentially leading to malicious actions executed by Java applications.
CVE-2016-5552 may not be exploitable in all environments, as it largely depends on how Java applications handle URL inputs and user data.