First published: Tue Jan 14 2014(Updated: )
It was discovered that the decoder (DocumentHandler in OpenJDK 7 and ObjectHandler OpenJDK 6) allowed processing of XML external entities. An application using JavaBeans could possibly disclose sensitive information, or be target of a DoS attack, triggered via XML external entities.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.4 | 2.4.4 |
redhat/icedtea | <2.3.13 | 2.3.13 |
redhat/icedtea | <1.12.8 | 1.12.8 |
redhat/icedtea | <1.13.1 | 1.13.1 |
Oracle Java SE | =r27.7.7 | |
Oracle Java SE | =r28.2.9 | |
Oracle JRE | =1.7.0-update45 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update65 | |
Oracle JRE | =1.6.0-update65 | |
Oracle OpenJDK 1.8.0 | =1.5.0-update55 | |
Oracle JRE | =1.5.0-update55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0423 is classified as a medium-severity vulnerability that can lead to information disclosure or Denial of Service attacks.
To address CVE-2014-0423, upgrade to a non-vulnerable version of the affected packages, such as icedtea 2.4.4 or JDK 1.7.0-update45.
CVE-2014-0423 affects applications utilizing JavaBeans that process XML external entities, specifically in OpenJDK and Oracle JDK versions.
CVE-2014-0423 can enable attackers to perform information disclosure and Denial of Service (DoS) attacks via malicious XML content.
A recommended temporary workaround for CVE-2014-0423 is to disable the processing of XML external entities in your application configuration until a patch can be applied.