First published: Sun Jan 12 2014(Updated: )
A flaw was found in the way JAAS (Java Authentication and Authorization Service) handled principals set for Subject. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions via deserialization of Subject.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.4 | 2.4.4 |
redhat/icedtea | <2.3.13 | 2.3.13 |
redhat/icedtea | <1.12.8 | 1.12.8 |
redhat/icedtea | <1.13.1 | 1.13.1 |
Oracle JDK 6 | =1.6.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update45 | |
Oracle JDK 6 | =1.5.0-update55 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0416 has been classified as a moderate severity vulnerability due to potential bypass of Java sandbox restrictions.
To fix CVE-2014-0416, update to the latest versions of affected packages, such as icedtea versions above 2.4.4 or Oracle JDK versions above 1.6.0-update65.
CVE-2014-0416 is a deserialization vulnerability that allows untrusted Java applications to bypass security constraints.
CVE-2014-0416 affects Oracle JDK and JRE versions 1.5.0-update55, 1.6.0-update65, and 1.7.0-update45.
The impact of CVE-2014-0416 can allow untrusted Java applications to perform unauthorized actions by escaping the Java sandbox environment.