CVE-2018-2599

Public on 2018-01-18
Modified on 2018-03-23
Description
It was discovered that the DNS client implementation in the JNDI component of OpenJDK did not use random source ports when sending out DNS queries. This could make it easier for a remote attacker to spoof responses to those queries.
Severity
Medium severity
Medium
CVSS v3 Base Score
4.8
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 java-1.7.0-openjdk 2018-03-21 ALAS-2018-974 Fixed
Amazon Linux 1 java-1.8.0-openjdk 2018-02-07 ALAS-2018-949 Fixed
Amazon Linux 2 - Core java-1.8.0-openjdk 2018-02-07 ALAS2-2018-949 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
NVD CVSSv2 5.8 AV:N/AC:M/Au:N/C:N/I:P/A:P
NVD CVSSv3 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L