jarsigner in OpenJDK and Oracle Java SE before 7u51 allows remote attackers to bypass a code-signing protection mechanism and inject unsigned bytecode into a signed JAR file by leveraging improper file validation.
https://bugzilla.redhat.com/show_bug.cgi?id=1031471
https://access.redhat.com/errata/RHSA-2014:0414
http://www.openwall.com/lists/oss-security/2015/02/09/9
http://www.openwall.com/lists/oss-security/2015/02/08/6
http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/d5f36e1c927e
Source: Mitre, NVD
Published: 2017-12-29
Updated: 2025-04-20
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
Severity: Medium
Base Score: 5.3
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS: 0.00967