First published: Mon Jan 13 2020(Updated: )
It was discovered that the Kerberos implementation in the Security component of OpenJDK used RSA-MD5 checksum in Ticket Granting Service (TGS) requests even though MD5 algorithm is no longer considered safe for such use case. A remote attacker could possibly use this flaw to manipulate TGS requests.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b07-1.el6_10 | 1.8.0-openjdk-1:1.8.0.242.b07-1.el6_10 |
redhat/java | <1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el6_10 | 1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el6_10 |
redhat/java | <1.7.1-ibm-1:1.7.1.4.70-1jpp.1.el6_10 | 1.7.1-ibm-1:1.7.1.4.70-1jpp.1.el6_10 |
redhat/java | <11-openjdk-1:11.0.6.10-1.el7_7 | 11-openjdk-1:11.0.6.10-1.el7_7 |
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b08-0.el7_7 | 1.8.0-openjdk-1:1.8.0.242.b08-0.el7_7 |
redhat/java | <1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el7_7 | 1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el7_7 |
redhat/java | <1.7.1-ibm-1:1.7.1.4.70-1jpp.1.el7 | 1.7.1-ibm-1:1.7.1.4.70-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-1:1.8.0.6.20-1jpp.1.el7 | 1.8.0-ibm-1:1.8.0.6.20-1jpp.1.el7 |
redhat/java | <11-openjdk-1:11.0.6.10-0.el8_1 | 11-openjdk-1:11.0.6.10-0.el8_1 |
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b08-0.el8_1 | 1.8.0-openjdk-1:1.8.0.242.b08-0.el8_1 |
redhat/java | <1.8.0-ibm-1:1.8.0.6.15-1.el8_2 | 1.8.0-ibm-1:1.8.0.6.15-1.el8_2 |
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b08-0.el8_0 | 1.8.0-openjdk-1:1.8.0.242.b08-0.el8_0 |
redhat/java | <11-openjdk-1:11.0.6.10-0.el8_0 | 11-openjdk-1:11.0.6.10-0.el8_0 |
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.25~5ea-1 | |
debian/openjdk-8 | 8u422-b05-1 | |
Oracle JDK 6 | =1.7.0-update241 | |
Oracle JDK 6 | =1.8.0-update231 | |
Oracle JDK 6 | =11.0.5 | |
Oracle JDK 6 | =13.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update_241 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update_231 | |
Oracle Java Runtime Environment (JRE) | =11.0.5 | |
Oracle Java Runtime Environment (JRE) | =13.0.1 | |
OpenJDK 17 | =7 | |
OpenJDK 17 | =7-update241 | |
OpenJDK 17 | =7-update80 | |
OpenJDK 17 | =7-update85 | |
OpenJDK 17 | =8 | |
OpenJDK 17 | =8-update102 | |
OpenJDK 17 | =8-update112 | |
OpenJDK 17 | =8-update152 | |
OpenJDK 17 | =8-update162 | |
OpenJDK 17 | =8-update172 | |
OpenJDK 17 | =8-update192 | |
OpenJDK 17 | =8-update20 | |
OpenJDK 17 | =8-update202 | |
OpenJDK 17 | =8-update212 | |
OpenJDK 17 | =8-update222 | |
OpenJDK 17 | =8-update232 | |
OpenJDK 17 | =8-update40 | |
OpenJDK 17 | =8-update60 | |
OpenJDK 17 | =8-update66 | |
OpenJDK 17 | =8-update72 | |
OpenJDK 17 | =8-update92 | |
OpenJDK 17 | =11 | |
OpenJDK 17 | =11.0.1 | |
OpenJDK 17 | =11.0.2 | |
OpenJDK 17 | =11.0.3 | |
OpenJDK 17 | =11.0.4 | |
OpenJDK 17 | =11.0.5 | |
OpenJDK 17 | =13 | |
OpenJDK 17 | =13.0.1 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
openSUSE | =15.1 | |
netapp active iq unified manager windows | >=7.3 | |
NetApp Active IQ Unified Manager for VMware vSphere | >=9.5 | |
netapp e-series performance analyzer | ||
NetApp E-Series SANtricity Management for VMware vCenter | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.60.3 | |
netapp e-series santricity storage manager | ||
netapp e-series santricity Web services Web services proxy | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
netapp santricity unified manager | ||
NetApp SteelStore | ||
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux eus | =8.1 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-2601 is classified as a medium severity vulnerability.
To fix CVE-2020-2601, update your OpenJDK to the recommended versions provided in the advisory.
CVE-2020-2601 affects multiple versions of OpenJDK, including 1.7, 1.8, and 11.
Yes, CVE-2020-2601 can potentially be exploited by a remote attacker.
The impact of CVE-2020-2601 could allow an attacker to manipulate Ticket Granting Service requests.