Your submission was sent successfully! Close

CVE-2016-5597

Published: 25 October 2016

Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.

From the Ubuntu security team

It was discovered that OpenJDK did not properly handle HTTP proxy authentication. An attacker could use this to expose HTTPS server authentication credentials.

Priority

Medium

CVSS 3 base score: 5.9

Status

Package Release Status
openjdk-6
Launchpad, Ubuntu, Debian
precise
Released (6b40-1.13.12-0ubuntu0.12.04.2)
trusty Does not exist
(trusty was released [6b40-1.13.12-0ubuntu0.14.04.3])
upstream Needs triage

xenial Does not exist

yakkety Does not exist

openjdk-7
Launchpad, Ubuntu, Debian
precise
Released (7u121-2.6.8-1ubuntu0.12.04.1)
trusty Does not exist
(trusty was released [7u121-2.6.8-1ubuntu0.14.04.1])
upstream Needs triage

xenial Does not exist

yakkety Does not exist

openjdk-8
Launchpad, Ubuntu, Debian
precise Does not exist

trusty Does not exist

upstream Needs triage

xenial
Released (8u111-b14-2ubuntu0.16.04.2)
yakkety
Released (8u111-b14-2ubuntu0.16.10.2)

Notes

AuthorNote
sbeattie
from the upstream release notes:
In some environments, certain authentication schemes
may be undesirable when proxying HTTPS. Accordingly,
the Basic authentication scheme has been deactivated, by
default, in the Oracle Java Runtime, by adding Basic to the
jdk.http.auth.tunneling.disabledSchemes networking property. Now,
proxies requiring Basic authentication when setting up a tunnel
for HTTPS will no longer succeed by default. If required, this
authentication scheme can be reactivated by removing Basic from
the jdk.http.auth.tunneling.disabledSchemes networking property,
or by setting a system property of the same name to "" ( empty )
on the command line.
.
Additionally, the jdk.http.auth.tunneling.disabledSchemes and
jdk.http.auth.proxying.disabledSchemes networking properties,
and system properties of the same name, can be used to disable
other authentication schemes that may be active when setting up
a tunnel for HTTPS, or proxying plain HTTP, respectively.

References

Bugs