First published: Fri Jan 10 2014(Updated: )
It was discovered that the Naming / JNDI component of OpenJDK failed to implement required package access checks. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.4 | 2.4.4 |
redhat/icedtea | <2.3.13 | 2.3.13 |
redhat/icedtea | <1.12.8 | 1.12.8 |
redhat/icedtea | <1.13.1 | 1.13.1 |
Oracle JDK | =1.5.0-update55 | |
Oracle JRE | =1.5.0-update55 | |
Oracle JDK | =1.6.0-update65 | |
Oracle JRE | =1.6.0-update65 | |
Oracle JRE | =1.7.0-update45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.