Vulnerabilities > CVE-2012-2739 - Cryptographic Issues vulnerability in Oracle Jdk, JRE and Openjdk
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 16 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
References
- http://armoredbarista.blogspot.de/2012/02/investigating-hashdos-issue.html
- http://mail.openjdk.java.net/pipermail/core-libs-dev/2012-May/010238.html
- http://www.kb.cert.org/vuls/id/903934
- http://www.nruns.com/_downloads/advisory28122011.pdf
- http://www.ocert.org/advisories/ocert-2011-003.html
- http://www.openwall.com/lists/oss-security/2012/06/15/12
- http://www.openwall.com/lists/oss-security/2012/06/17/1
- https://bugzilla.redhat.com/show_bug.cgi?id=750533