It was discovered that the SSL/TLS implementation in the JSSE component in OpenJDK failed to properly check whether the ChangeCipherSpec was received during the SSL/TLS connection handshake. An MITM attacker could possibly use this flaw to force a connection to be established without encryption being enabled.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | java-1.6.0-openjdk | 2015-02-11 19:38 | ALAS-2015-480 |
Amazon Linux 1 | java-1.7.0-openjdk | 2015-01-22 14:18 | ALAS-2015-471 |
Amazon Linux 1 | java-1.8.0-openjdk | 2015-01-22 14:20 | ALAS-2015-472 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 4.0 | AV:N/AC:H/Au:N/C:P/I:P/A:N |
NVD | CVSSv2 | 4.0 | AV:N/AC:H/Au:N/C:P/I:P/A:N |