First published: Sun Jan 12 2014(Updated: )
It was discovered that the JAXP (Java API for XML Processing) component in OpenJDK did not properly check code permissions when creating document builder factories. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.4 | 2.4.4 |
redhat/icedtea | <2.3.13 | 2.3.13 |
redhat/icedtea | <1.12.8 | 1.12.8 |
redhat/icedtea | <1.13.1 | 1.13.1 |
Oracle JDK 6 | =1.7.0-update45 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update45 | |
Oracle JDK 6 | =1.6.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update65 | |
Oracle JDK 6 | =1.5.0-update55 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0376 is considered a high severity vulnerability due to its potential to bypass Java sandbox restrictions.
To fix CVE-2014-0376, update to the latest version of the affected software packages such as icedtea or Oracle Java runtimes.
CVE-2014-0376 affects several versions of icedtea, Oracle JDK, and Oracle JRE, specifically versions prior to 2.4.4 and 1.7.0-update45.
CVE-2014-0376 involves the JAXP component in OpenJDK, which improperly checks code permissions.
Yes, an attacker can exploit CVE-2014-0376 remotely using an untrusted Java application or applet.