First published: Fri Jan 10 2014(Updated: )
It was discovered that the Naming / JNDI component of OpenJDK failed to implement required package access checks. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.4 | 2.4.4 |
redhat/icedtea | <2.3.13 | 2.3.13 |
redhat/icedtea | <1.12.8 | 1.12.8 |
redhat/icedtea | <1.13.1 | 1.13.1 |
Oracle JDK 6 | =1.5.0-update55 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update55 | |
Oracle JDK 6 | =1.6.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0422 is categorized as a high severity vulnerability due to its potential to bypass Java sandbox restrictions.
To fix CVE-2014-0422, upgrade to the latest versions of the affected packages such as icedtea version 2.4.4 or Oracle Java JRE/JDK updates.
CVE-2014-0422 affects Oracle JDK and JRE versions 1.5.0, 1.6.0, and 1.7.0, as well as specific versions of Red Hat's icedtea.
Yes, CVE-2014-0422 can potentially be exploited remotely by untrusted Java applications or applets.
Exploitation of CVE-2014-0422 could allow an attacker to bypass Java security policies, leading to unauthorized access or control over the affected system.