It was discovered that the DNS client implementation in the JNDI component of OpenJDK did not use random source ports when sending out DNS queries. This could make it easier for a remote attacker to spoof responses to those queries.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | java-1.7.0-openjdk | 2018-03-21 22:12 | ALAS-2018-974 |
Amazon Linux 1 | java-1.8.0-openjdk | 2018-02-07 17:45 | ALAS-2018-949 |
Amazon Linux 2 - Core | java-1.8.0-openjdk | 2018-02-07 17:47 | ALAS2-2018-949 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 4.8 | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L |
NVD | CVSSv2 | 5.8 | AV:N/AC:M/Au:N/C:N/I:P/A:P |
NVD | CVSSv3 | 4.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L |