CVE-2016-5597

Publication date 25 October 2016

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

5.9 · Medium

Score breakdown

Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.

From the Ubuntu Security Team

It was discovered that OpenJDK did not properly handle HTTP proxy authentication. An attacker could use this to expose HTTPS server authentication credentials.

Read the notes from the security team

Status

Package Ubuntu Release Status
openjdk-6 16.10 yakkety Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty
Fixed 6b40-1.13.12-0ubuntu0.14.04.3
12.04 LTS precise
Fixed 6b40-1.13.12-0ubuntu0.12.04.2
openjdk-7 16.10 yakkety Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty
Fixed 7u121-2.6.8-1ubuntu0.14.04.1
12.04 LTS precise
Fixed 7u121-2.6.8-1ubuntu0.12.04.1
openjdk-8 16.10 yakkety
Fixed 8u111-b14-2ubuntu0.16.10.2
16.04 LTS xenial
Fixed 8u111-b14-2ubuntu0.16.04.2
14.04 LTS trusty Not in release
12.04 LTS precise Not in release

Notes


sbeattie

from the upstream release notes: In some environments, certain authentication schemes may be undesirable when proxying HTTPS. Accordingly, the Basic authentication scheme has been deactivated, by default, in the Oracle Java Runtime, by adding Basic to the jdk.http.auth.tunneling.disabledSchemes networking property. Now, proxies requiring Basic authentication when setting up a tunnel for HTTPS will no longer succeed by default. If required, this authentication scheme can be reactivated by removing Basic from the jdk.http.auth.tunneling.disabledSchemes networking property, or by setting a system property of the same name to "" ( empty ) on the command line. . Additionally, the jdk.http.auth.tunneling.disabledSchemes and jdk.http.auth.proxying.disabledSchemes networking properties, and system properties of the same name, can be used to disable other authentication schemes that may be active when setting up a tunnel for HTTPS, or proxying plain HTTP, respectively.

Severity score breakdown

Parameter Value
Base score 5.9 · Medium
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N