First published: Mon Jan 15 2018(Updated: )
It was discovered that the DNS client implementation in the JNDI component of OpenJDK did not use random source ports when sending out DNS queries. This would make it easier for a remote attacker to spoof responses to those queries.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK JNDI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1534543 is classified as high due to the potential for DNS response spoofing.
To fix REDHAT-BUG-1534543, update your OpenJDK to the latest version that contains the patch addressing the random source port issue.
REDHAT-BUG-1534543 affects specific versions of OpenJDK that utilize the JNDI component for DNS queries.
The risks associated with REDHAT-BUG-1534543 include increased exposure to DNS spoofing attacks, potentially allowing attackers to intercept or manipulate network traffic.
Yes, REDHAT-BUG-1534543 is a known issue primarily associated with OpenJDK's JNDI implementation, but similar vulnerabilities can occur in other software handling DNS queries.