First published: Mon Jan 13 2020(Updated: )
It was discovered that the Kerberos implementation in the Security component of OpenJDK used RSA-MD5 checksum in Ticket Granting Service (TGS) requests even though MD5 algorithm is no longer considered safe for such use case. A remote attacker could possibly use this flaw to manipulate TGS requests.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1790570 is rated as critical due to the potential for remote attackers to manipulate Ticket Granting Service requests.
To mitigate REDHAT-BUG-1790570, update to a version of OpenJDK that has eliminated the use of the deprecated RSA-MD5 checksum in TGS requests.
REDHAT-BUG-1790570 affects specific versions of Oracle OpenJDK, particularly those using the vulnerable Kerberos implementation.
REDHAT-BUG-1790570 enables remote attackers to possibly manipulate Ticket Granting Service requests due to the insecure MD5 checksum.
To check if you are using an affected version related to REDHAT-BUG-1790570, confirm your OpenJDK version against known vulnerabilities in security advisories.