First published: Tue Oct 16 2018(Updated: )
It was discovered that the JNDI comment of OpenJDK did not properly enforce the restriction controlled by the com.sun.jndi.ldap.object.trustURLCodebase system property. In certain cases, a Java LDAP client could unexpectedly load and execute code form an LDAP server.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1639834 is considered high due to the potential for remote code execution.
To fix REDHAT-BUG-1639834, users should update to the latest version of OpenJDK where the vulnerability has been patched.
REDHAT-BUG-1639834 affects OpenJDK, particularly versions that do not properly enforce URL codebase restrictions.
REDHAT-BUG-1639834 allows a Java LDAP client to potentially load and execute malicious code from an LDAP server due to insufficient enforcement of security controls.
Developers and organizations using vulnerable versions of OpenJDK are at risk from the exploitation of REDHAT-BUG-1639834.