First published: Mon Oct 17 2016(Updated: )
It was discovered that the Hotspot component of OpenJDK did not properly check Java Debug Wire Protocol (JDWP) packets, which could possibly allow HTTP requests issues by a web browser to be interpreted as valid JDWP messages. An attacker could possibly use this flaw to send debugging commands to a Java program or applet running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1385544 is considered critical due to its potential to allow remote code execution through improper handling of JDWP packets.
To fix REDHAT-BUG-1385544, apply the latest security patches provided for OpenJDK 17 from Oracle.
REDHAT-BUG-1385544 affects users of Oracle OpenJDK, particularly version 17.
Exploiting REDHAT-BUG-1385544 could allow attackers to send unauthorized debugging commands to the Java application.
REDHAT-BUG-1385544 was disclosed in 2016 and is related to vulnerabilities found in older versions of OpenJDK.