First published: Sun Jul 16 2017(Updated: )
It was discovered that the JAR (Java ARchive) verifier in the Security component of OpenJDK did not correctly handle files inside archives with missing digest. An attacker could possibly use this flaw to manipulate content of a singed JAR, bypassing intended verification.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1471535 is classified as high due to its potential to allow content manipulation of signed JAR files.
To fix REDHAT-BUG-1471535, update to the latest version of OpenJDK that contains the security patch addressing this vulnerability.
The impact of REDHAT-BUG-1471535 allows attackers to bypass intended verification of signed JAR files, potentially leading to malicious code execution.
REDHAT-BUG-1471535 affects the OpenJDK security component, specifically during the verification of JAR files.
Mitigating REDHAT-BUG-1471535 without updating OpenJDK is challenging; the best practice is to apply the necessary updates as they are released.