First published: Sat Jan 11 2014(Updated: )
A flaw found in the way Security component in OpenJDK handled null xmlns (XML namespace) attributes when performing XML document canonicalization. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.4 | 2.4.4 |
redhat/icedtea | <2.3.13 | 2.3.13 |
redhat/icedtea | <1.12.8 | 1.12.8 |
redhat/icedtea | <1.13.1 | 1.13.1 |
Oracle JDK 6 | =1.6.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5878 is classified as a moderate severity vulnerability.
To fix CVE-2013-5878, upgrade to versions of IcedTea greater than 2.4.4 or Oracle JDK/JRE greater than 1.6.0-update65.
CVE-2013-5878 is caused by improper handling of null XML namespace attributes in OpenJDK during XML canonicalization.
Affected versions for CVE-2013-5878 include IcedTea versions up to 2.4.4 and Oracle JDK/JRE versions up to 1.6.0-update65.
Yes, CVE-2013-5878 can potentially be exploited by an untrusted application or applet to bypass Java sandbox restrictions.