First published: Mon Oct 19 2020(Updated: )
It was discovered that the LDAP client implementation in the JNDI component of OpenJDK did not properly track whether a connection to a server uses TLS encryption, and consequently did not properly restrict the set of authentication mechanisms that were allowed to be used over an unencrypted connection. This could possibly lead to sending of plain text authentication credentials over an unencrypted connection.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1889274 is considered high due to potential security risks in authentication mechanisms.
To fix REDHAT-BUG-1889274, update the OpenJDK JNDI component to the latest version provided by your vendor.
REDHAT-BUG-1889274 is associated with vulnerabilities in TLS encryption and unencrypted connection risks.
All versions of OpenJDK JNDI prior to the patch are affected by REDHAT-BUG-1889274.
A possible workaround for REDHAT-BUG-1889274 is to enforce TLS on all LDAP connections as a temporary measure.