Skip navigation.
Arch2Arch Tab BEA.com

Security Advisories and Notifications

Subject: Security Advisory (BEA07-178.00)
From: BEA Systems Inc.
Minor Subject: Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition
Product(s) Affected: BEA JRockit and BEA Products Using JRockit

Threat level: High
This vulnerability may be exploited to create a Denial of Service (DoS) condition to the system as a whole on a server that listens for SSL/TLS connections using JSSE for SSL/TLS support.

Severity: High
Exploit of this vulnerability may lead to a Denial of Service (DoS) condition.

A problem was identified that could potentially cause a security vulnerability in certain versions of JRockit. Upgrades are available to correct this problem (see Section II). BEA Systems treats potential security problems with a high degree of urgency and endeavors to take appropriate steps to help ensure the security of our customers' systems. As a result, BEA Systems strongly suggests the following actions:

I. Read the following advisory.
II. Apply the suggested action.
III. If you know of any additional users interested in future security advisories, please forward them the registration instructions included in this advisory.

I. Advisory

The Java Secure Socket Extension (JSSE) that is included in various releases of the Java Runtime Environment does not correctly process SSL/TLS handshake requests. This vulnerability may be exploited to create a Denial of Service (DoS) condition to the system as a whole on a server that listens for SSL/TLS connections using JSSE for SSL/TLS support. Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1

This advisory corrects this issue by supplying patched versions of JRockit.

Impact and CVSS Ratings:

CVSS Severity Score: 3.3 (Low)
Attack Range (AV): Remote
Attack Complexity (AC): Low
Authentication Level (Au): Not Required
Impact Type: Denial of Service; Allows Partial Availability Violation
Vulnerability Type: Denial of Service, Exceptional Error condition
CVSS Base Score Vector: (AV:R/AC:L/Au:NR/C:N/I:N/A:C/B:N)

Complete CVSS Guide: http://www.first.org/cvss/cvss-guide.html
Online Calculator: http://nvd.nist.gov/cvss.cfm?calculator

The following versions of BEA JRockit are affected by this vulnerability

    BEA JRockit R27.3.1 or prior using
  • JDK and JRE 6 Update 1 and earlier

  • JDK and JRE 5.0 Updates 7, 8, 9, 10, and 11

  • SDK and JRE 1.4.2_11, _12, _13, and _14

II. SUGGESTED ACTION

BEA Systems strongly recommends the following course of actions.

For JDK 1.4.2 JDK, 1.5.0 or JDK 6:

1. If you are using JRockit release R27.3.1 or earlier, download the appropriate patch from the following location and save the downloaded patch to a temporary directory:

JRockit 1.4.2 R27.3.1 JDK Linux (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.4.2_14-linux_ia32.tar.gz

JRockit 5.0 R27.3.1 JDK Linux (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-linux_ia32.tar.gz

JRockit 6 R27.3.1 JDK Linux (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.6.0_01-linux_ia32.tar.gz

JRockit 5.0 R27.3.1 JDK Linux (Intel EM64T & AMD64 - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-linux_x86_64.tar.gz

JRockit 6 R27.3.1 JDK Linux (Intel EM64T & AMD64 - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.6.0_01-linux_x86_64.tar.gz

JRockit 1.4.2 R27.3.1 JDK Linux (Intel Itanium - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.4.2_14-linux_ia64.tar.gz

JRockit 5.0 R27.3.1 JDK Linux (Intel Itanium - 64-bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-linux_ia64.tar.gz

JRockit 1.4.2 R27.3.1 JDK Sun Solaris (SPARC - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.4.2_14-solaris_sparcv9.tar.gz

JRockit 5.0 R27.3.1 JDK Solaris (SPARC - 64-bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-solaris_sparcv9.tar.gz

BEA JRockit 1.4.2 R27.3.1 JDK Microsoft Windows (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.4.2_14-windows_ia32.zip

JRockit 5.0 R27.3.1 JDK Microsoft Windows (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-windows_ia32.zip

JRockit 6 R27.3.1 JDK Microsoft Windows (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.6.0_01-windows_ia32.zip

JRockit 5.0 R27.3.1 JDK Microsoft Windows (Intel EM64T & AMD64 - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-windows_x86_64.zip

JRockit 6 R27.3.1 JDK Microsoft Windows (Intel EM64T & AMD64 - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.6.0_01-windows_x86_64.zip

JRockit 1.4.2 R27.3.1 JDK Microsoft Windows (Intel Itanium - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.4.2_14-windows_ia64.zip

JRockit 5.0 R27.3.1 JDK Microsoft Windows (Intel Itanium - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-windows_ia64.zip

2. Unpack the package using unzip on Windows and tar on Linux and Solaris. This package contains the complete JRockit installation. The existing JRockit installation needs to be replaced with the patched installation.

3. Save the current JRockit installation to a new location.

4. Replace the current JRockit installation with the files from the patch.

5. Restart the server.

Note: It is highly recommended that the original files be saved before updating them with the patched files.

BEA strongly suggests that customers apply the remedies recommended in all our security advisories. BEA also urges customers to apply every Service/Maintenance Pack as they are released. Service/Maintenance Packs include a roll-up of all bug fixes for each version of the product, as well as each of the prior Service/Maintenance Packs. Service/Maintenance Packs and information about them can be found at:

BEA JRockit:
http://commerce.bea.com/products/weblogicjrockit/jrockit_prod_fam.jsp

WebLogic Server:
http://commerce.bea.com/showallversions.jsp?family=WLS

WebLogic Platform:
http://commerce.bea.com/showallversions.jsp?family=WLP

Note: Information about securing WebLogic Server and WebLogic Express can be found at
http://edocs.bea.com/wls/docs81/security.html. Specific lockdown information is provided at http://edocs.bea.com/wls/docs81/lockdown/index.html. We strongly encourage you to review this documentation to ensure your server deployment is securely configured.

III. FUTURE SECURITY COMMUNICATIONS

If there are security-related issues with BEA product, BEA Systems generally distributes an advisory and instructions with a recommended course of action. Because the security of your site, data, and code is a high priority, we are committed to generally communicating security-related issues to our customers and partners.

All previous advisories can be viewed at http://dev2dev.bea.com/advisoriesnotifications/

BEA Systems has established an opt-in emailing list specifically targeted for product security advisories and notifications. As a policy, if a user has opted-in to our emailing list and there is a relevant security issue with the BEA product(s) he/she is using, BEA generally distributes an advisory and instructions via email with a recommended course of action.

ADDITIONAL USERS WHO WISH TO REGISTER FOR ADVISORY DISTRIBUTION SHOULD FOLLOW THE REGISTRATION DIRECTIONS AT http://dev2dev.bea.com/advisoriesnotifications/

IV. REPORTING SECURITY ISSUES

Security issues can be reported to BEA Systems by sending email to secalert@bea.com or by following the directions at http://dev2dev.bea.com/advisoriesnotifications/. If BEA has validated a reported security issue, we will endeavor to assess the severity of the impact of the security issue and the likelihood of the exploitation of the vulnerability. Based on these assessments and other factors, BEA will endeavor to develop and appropriately prioritize a workaround or patch designed to reduce or eliminate the risk of the vulnerability.

If you have any questions or care to verify the authenticity of this advisory, please contact BEA Technical Support at support@bea.com

Thank you,
BEA Systems, Inc.