First published: Tue Apr 18 2017(Updated: )
It was discovered that the FTP client implementation in the Networking component of OpenJDK failed to correctly handle user inputs (e.g. usernames and passwords) containing newline characters. A remote attacker could possibly use this flaw to manipulate an FTP connection opened by a Java application if it could make it access a specially crafted FTP URL. Blog posts were published that describe how to use this flaw to open ports on firewalls using active FTP connections: <a href="http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html">http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html</a> and sending mails during XML parsing when use of XML external entities is allowed: <a href="https://shiftordie.de/blog/2017/02/18/smtp-over-xxe/">https://shiftordie.de/blog/2017/02/18/smtp-over-xxe/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1443083 is considered high due to the potential for remote exploitation.
To fix REDHAT-BUG-1443083, upgrade to the latest version of OpenJDK that addresses this vulnerability.
The impact of REDHAT-BUG-1443083 could allow a remote attacker to manipulate FTP connections using crafted user inputs.
REDHAT-BUG-1443083 affects specific versions of OpenJDK, particularly those prior to the release that includes the fix.
To verify your system's vulnerability to REDHAT-BUG-1443083, check if the OpenJDK version running on your system is listed as affected.