First published: Fri Jan 10 2014(Updated: )
A flaw was found in the way SNMP implementation in the Serviceability component in OpenJDK raised SnmpStatusException exception. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.4 | 2.4.4 |
redhat/icedtea | <2.3.13 | 2.3.13 |
redhat/icedtea | <1.12.8 | 1.12.8 |
redhat/icedtea | <1.13.1 | 1.13.1 |
Oracle Java Runtime Environment (JRE) | =1.7.0-update45 | |
Oracle JDK 6 | =1.5.0-update55 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update55 | |
Oracle JDK 6 | =1.6.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update65 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0373 is considered a moderate severity vulnerability due to its potential to allow bypassing Java sandbox restrictions.
To fix CVE-2014-0373, update the affected software packages to the latest versions recommended for the OpenJDK environment.
CVE-2014-0373 affects various versions of Oracle JDK and JRE, particularly versions 1.5.0-update55 to 1.7.0-update45.
CVE-2014-0373 may allow untrusted Java applications to bypass sandbox restrictions, potentially leading to unauthorized actions.
As of now, there are no public exploits documented for CVE-2014-0373, but the vulnerability poses a risk if left unaddressed.