First published: Tue Jan 14 2014(Updated: )
It was discovered that the Security component in OpenJDK could pass mutable strings to untrusted code. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.4 | 2.4.4 |
redhat/icedtea | <2.3.13 | 2.3.13 |
redhat/icedtea | <1.12.8 | 1.12.8 |
redhat/icedtea | <1.13.1 | 1.13.1 |
Oracle JDK 6 | =1.6.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update65 | |
Oracle JDK 6 | =1.7.0-update45 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5910 has been rated as a high-severity vulnerability that can allow bypassing Java sandbox restrictions.
To fix CVE-2013-5910, you should upgrade to the latest patched versions of OpenJDK or IcedTea as specified by the vendor.
CVE-2013-5910 affects various versions of Oracle JDK and JRE, specifically 6u65 and 7u45, along with multiple versions of IcedTea.
The potential impact of CVE-2013-5910 includes the ability for untrusted Java applications to execute code outside of the controlled sandbox environment.
There are no effective workarounds for CVE-2013-5910; upgrading to a secure version is the most reliable mitigation.