First published: Mon Jan 15 2018(Updated: )
It was discovered that the DNS client implementation in the JNDI component of OpenJDK did not use random source ports when sending out DNS queries. This would make it easier for a remote attacker to spoof responses to those queries.
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-8 | 8u442-ga-2 | |
Oracle JDK 6 | =1.6.0-update171 | |
Oracle JDK 6 | =1.7.0-update161 | |
Oracle JDK 6 | =1.8.0-update152 | |
Oracle JDK 6 | =9.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update171 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update161 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update152 | |
Oracle Java Runtime Environment (JRE) | =9.0.1 | |
BEA JRockit | =r28.3.16 | |
redhat satellite | =5.6 | |
redhat satellite | =5.7 | |
redhat satellite | =5.8 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.4 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Schneider Electric EcoStruxure Data Center Expert | <7.6.0 | |
HP P9000 Command View Advanced Edition Software | >=8.6.2-01 | |
HP XP P9000 Command View | >=8.6.2-01 | |
HP P9000 Command View Advanced Edition Software | >=8.6.2-01 | |
Oracle JDK 6 | =1.9.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-2599 is medium.
The affected software versions of CVE-2018-2599 are: Java SE: 6u171, 7u161, 8u152, and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16.
An unauthenticated attacker can exploit CVE-2018-2599 through a difficult to exploit vulnerability.
The fix for CVE-2018-2599 depends on the software version and can be found in the provided references.
More information about CVE-2018-2599 can be found in the provided references.