First published: Mon Apr 18 2016(Updated: )
It was discovered that the GCM (Galois/Counter Mode) implementation in the JCE component of OpenJDK used non-constant time comparison when comparing GCM authentication tag. A remote attacker could possibly use this flaw to determine correct value of the authentication tag and bypass authentication protections of GCM.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1328059 is considered high due to its potential to allow bypass of authentication.
To fix REDHAT-BUG-1328059, upgrade to the patched version of OpenJDK provided by Oracle.
REDHAT-BUG-1328059 affects installations of Oracle OpenJDK, particularly versions that implement GCM.
Yes, REDHAT-BUG-1328059 can potentially be exploited by a remote attacker if the vulnerable OpenJDK implementation is used.
Exploiting REDHAT-BUG-1328059 can allow an attacker to determine valid authentication tags, enabling authentication bypass.