CVE-2016-5542
Published: 25 October 2016
Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to Libraries.
From the Ubuntu Security Team
It was discovered that OpenJDK did not restrict the set of algorithms used for Jar integrity verification. An attacker could use this to modify without detection the content of a JAR file, affecting system integrity.
Notes
Author | Note |
---|---|
sbeattie | The following algorithms and key sizes are restricted in this release: - MD2 (in either the digest or signature algorithm) - RSA keys less than 1024 bits Upstream is planning to restrict MD5-based signatures in signed JARs in the January 2017 CPU. . The list of disabled algorithms is controlled via a new security property, jdk.jar.disabledAlgorithms, in the java.security file. This property contains a list of disabled algorithms and key sizes for cryptographically signed JAR files. |
Priority
Status
Package | Release | Status |
---|---|---|
openjdk-6 Launchpad, Ubuntu, Debian |
precise |
Released
(6b40-1.13.12-0ubuntu0.12.04.2)
|
trusty |
Released
(6b40-1.13.12-0ubuntu0.14.04.3)
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
openjdk-7 Launchpad, Ubuntu, Debian |
precise |
Released
(7u121-2.6.8-1ubuntu0.12.04.1)
|
trusty |
Released
(7u121-2.6.8-1ubuntu0.14.04.1)
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
openjdk-8 Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Released
(8u111-b14-2ubuntu0.16.04.2)
|
|
yakkety |
Released
(8u111-b14-2ubuntu0.16.10.2)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.1 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N |
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
- http://www.oracle.com/technetwork/java/javase/8u111-relnotes-3124969.html
- https://ubuntu.com/security/notices/USN-3121-1
- https://ubuntu.com/security/notices/USN-3130-1
- https://ubuntu.com/security/notices/USN-3154-1
- https://www.cve.org/CVERecord?id=CVE-2016-5542
- NVD
- Launchpad
- Debian