First published: Mon Jul 13 2015(Updated: )
It was discovered that the Elliptic Curve (EC) cryptography code as used in Mozilla NSS (Network Security Services) library and OpenJDK JCE (Java Cryptography Extension) component failed to properly validate EC parameters as used in ECDH_Derive() function, which performs ECDH (Elliptic Curve Diffie-Hellman) key derivation. A remote attacker could use this flaw to disclose sensitive information. The OpenJDK packages as shipped with Red Hat Enterprise Linux 5, 6 and 7 do not build the affected EC code and are therefore not directly affected. Future versions may provide EC support via NSS, see e.g. <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - ECC decode refactoring needed to build OpenJDK SunEC provider for ECC support" href="show_bug.cgi?id=1075702">bug 1075702</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Network Security Services (NSS) | ||
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1242456 is considered high due to improper validation in the cryptography code.
Fix REDHAT-BUG-1242456 by updating the affected versions of Mozilla NSS and Oracle OpenJDK to the latest secure releases.
REDHAT-BUG-1242456 may allow attackers to exploit the improper validation of EC parameters, potentially compromising secure communications.
The affected software for REDHAT-BUG-1242456 includes Mozilla Network Security Services (NSS) and Oracle OpenJDK.
There is no specific workaround for REDHAT-BUG-1242456; the recommended action is to apply the available patch or update.