// For flags

CVE-2015-0478

OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726)

Severity Score

5.9
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.

Vulnerabilidad no especificada en Oracle Java SE 5.0u81, 6u91, 7u76, y 8u40, y JRockit R28.3.5, permite a atacantes remotos afectar la confidencialidad a través de vectores relacionados con JCE.

It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures.

An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. A flaw was discovered in the Beans component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-12-17 CVE Reserved
  • 2015-04-16 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-358: Improperly Implemented Security Check for Standard
CAPEC
References (44)
URL Date SRC
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-0806.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-0807.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-0808.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-0809.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-0854.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-0857.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-0858.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-1006.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-1007.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-1020.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-1021.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2015-1091.html 2022-05-13
http://www.debian.org/security/2015/dsa-3234 2022-05-13
http://www.debian.org/security/2015/dsa-3235 2022-05-13
http://www.debian.org/security/2015/dsa-3316 2022-05-13
http://www.mandriva.com/security/advisories?name=MDVSA-2015:212 2022-05-13
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html 2022-05-13
http://www.ubuntu.com/usn/USN-2573-1 2022-05-13
http://www.ubuntu.com/usn/USN-2574-1 2022-05-13
https://security.gentoo.org/glsa/201603-11 2022-05-13
https://access.redhat.com/security/cve/CVE-2015-0478 2015-06-11
https://bugzilla.redhat.com/show_bug.cgi?id=1210355 2015-06-11
https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf 2015-06-11
https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy 2015-06-11
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Jrockit
Search vendor "Oracle" for product "Jrockit"
r28.3.5
Search vendor "Oracle" for product "Jrockit" and version "r28.3.5"
-
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.5.0
Search vendor "Oracle" for product "Jdk" and version "1.5.0"
update8
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.6.0
Search vendor "Oracle" for product "Jdk" and version "1.6.0"
update91
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.7.0
Search vendor "Oracle" for product "Jdk" and version "1.7.0"
update76
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.8.0
Search vendor "Oracle" for product "Jdk" and version "1.8.0"
update40
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.5.0
Search vendor "Oracle" for product "Jre" and version "1.5.0"
update81
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.6.0
Search vendor "Oracle" for product "Jre" and version "1.6.0"
update91
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.7.0
Search vendor "Oracle" for product "Jre" and version "1.7.0"
update76
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.8.0
Search vendor "Oracle" for product "Jre" and version "1.8.0"
update40
Affected