10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.018 Low
EPSS
Percentile
88.1%
Issue Overview:
An improper permission check issue was discovered in the JMX component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2013-1486)
It was discovered that OpenJDK leaked timing information when decrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites were used. A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a TLS/SSL server as a padding oracle. (CVE-2013-0169)
Affected Packages:
java-1.6.0-openjdk
Issue Correction:
Run yum update java-1.6.0-openjdk to update your system.
New Packages:
i686:
java-1.6.0-openjdk-devel-1.6.0.0-56.1.11.8.51.amzn1.i686
java-1.6.0-openjdk-javadoc-1.6.0.0-56.1.11.8.51.amzn1.i686
java-1.6.0-openjdk-src-1.6.0.0-56.1.11.8.51.amzn1.i686
java-1.6.0-openjdk-demo-1.6.0.0-56.1.11.8.51.amzn1.i686
java-1.6.0-openjdk-1.6.0.0-56.1.11.8.51.amzn1.i686
java-1.6.0-openjdk-debuginfo-1.6.0.0-56.1.11.8.51.amzn1.i686
src:
java-1.6.0-openjdk-1.6.0.0-56.1.11.8.51.amzn1.src
x86_64:
java-1.6.0-openjdk-javadoc-1.6.0.0-56.1.11.8.51.amzn1.x86_64
java-1.6.0-openjdk-demo-1.6.0.0-56.1.11.8.51.amzn1.x86_64
java-1.6.0-openjdk-debuginfo-1.6.0.0-56.1.11.8.51.amzn1.x86_64
java-1.6.0-openjdk-src-1.6.0.0-56.1.11.8.51.amzn1.x86_64
java-1.6.0-openjdk-devel-1.6.0.0-56.1.11.8.51.amzn1.x86_64
java-1.6.0-openjdk-1.6.0.0-56.1.11.8.51.amzn1.x86_64
Red Hat: CVE-2013-0169, CVE-2013-1486
Mitre: CVE-2013-0169, CVE-2013-1486