CVE-2016-5597
Publication date 25 October 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.
From the Ubuntu Security Team
It was discovered that OpenJDK did not properly handle HTTP proxy authentication. An attacker could use this to expose HTTPS server authentication credentials.
Status
Package | Ubuntu Release | Status |
---|---|---|
openjdk-6 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 6b40-1.13.12-0ubuntu0.14.04.3
|
|
openjdk-7 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 7u121-2.6.8-1ubuntu0.14.04.1
|
|
openjdk-8 | ||
16.04 LTS xenial |
Fixed 8u111-b14-2ubuntu0.16.04.2
|
|
14.04 LTS trusty | Not in release | |
Notes
sbeattie
from the upstream release notes: In some environments, certain authentication schemes may be undesirable when proxying HTTPS. Accordingly, the Basic authentication scheme has been deactivated, by default, in the Oracle Java Runtime, by adding Basic to the jdk.http.auth.tunneling.disabledSchemes networking property. Now, proxies requiring Basic authentication when setting up a tunnel for HTTPS will no longer succeed by default. If required, this authentication scheme can be reactivated by removing Basic from the jdk.http.auth.tunneling.disabledSchemes networking property, or by setting a system property of the same name to "" ( empty ) on the command line. . Additionally, the jdk.http.auth.tunneling.disabledSchemes and jdk.http.auth.proxying.disabledSchemes networking properties, and system properties of the same name, can be used to disable other authentication schemes that may be active when setting up a tunnel for HTTPS, or proxying plain HTTP, respectively.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3121-1
- OpenJDK 8 vulnerabilities
- 3 November 2016
- USN-3130-1
- OpenJDK 7 vulnerabilities
- 17 November 2016
- USN-3154-1
- OpenJDK 6 vulnerabilities
- 8 December 2016