First published: Tue Jan 17 2017(Updated: )
A covert timing channel flaw was found in the ECDSA implementation in the Libraries component of OpenJDK. A remote attacker able to make a Java application generate ECDSA signatures on demand could possibly use this flaw to extract certain information about the key use via a timing side channel.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1413923 is considered high due to the potential for remote attackers to extract sensitive information.
To fix REDHAT-BUG-1413923, update your OpenJDK installation to the latest patched version provided by your vendor.
The nature of the vulnerability in REDHAT-BUG-1413923 is a covert timing channel flaw in the ECDSA implementation of OpenJDK.
Anyone using OpenJDK for Java applications that generate ECDSA signatures can be affected by REDHAT-BUG-1413923.
Yes, REDHAT-BUG-1413923 is potentially exploitable remotely by attackers capable of inducing ECDSA signature generation.