jarsigner in OpenJDK and Oracle Java SE before 7u51 allows remote attackers to bypass a code-signing protection mechanism and inject unsigned bytecode into a signed JAR file by leveraging improper file validation.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2014:0414 | vdb entry third party advisory patch vendor advisory |
http://www.openwall.com/lists/oss-security/2015/02/08/6 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2015/02/09/9 | third party advisory mailing list |
http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/d5f36e1c927e | patch vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1031471 | issue tracking patch vdb entry third party advisory |