First published: Fri Oct 13 2017(Updated: )
It was discovered that the Kerberos client implementation in the Libraries component of OpenJDK used the sname field from the plain text part rather than encrypted part of the KDC reply. A man-in-the-middle attacker could possibly use this flaw to impersonate Kerberos services to Java applications acting as Kerberos clients.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1502038 is high due to its potential for man-in-the-middle attacks.
To fix REDHAT-BUG-1502038, update your OpenJDK to the latest version that includes the security patch.
REDHAT-BUG-1502038 affects the OpenJDK 17 implementation used by Oracle.
REDHAT-BUG-1502038 allows a man-in-the-middle attacker to impersonate Kerberos services.
The Libraries component of OpenJDK is vulnerable as identified in REDHAT-BUG-1502038.