First published: Tue Jan 14 2014(Updated: )
A flaw was found in the way the Networking component of OpenJDK checked permissions of code to listen on network ports. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.4 | 2.4.4 |
redhat/icedtea | <2.3.13 | 2.3.13 |
redhat/icedtea | <1.12.8 | 1.12.8 |
redhat/icedtea | <1.13.1 | 1.13.1 |
Oracle JDK 6 | =1.5.0-update55 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update55 | |
Oracle JDK 6 | =1.6.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update65 | |
Oracle JDK 6 | =1.7.0-update45 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0368 is classified as a moderate severity vulnerability allowing untrusted Java applications to bypass sandbox restrictions.
To fix CVE-2014-0368, upgrade to the latest version of IcedTea or the Oracle Java versions that are no longer vulnerable.
CVE-2014-0368 affects specific versions of Oracle JDK and JRE as well as multiple versions of the IcedTea package.
CVE-2014-0368 can facilitate attacks that allow malicious Java code to listen on network ports, bypassing security restrictions.
Yes, CVE-2014-0368 specifically affects Oracle Java SE versions 5.0u55, 6u65, and 7u45 among others.