First published: Fri Jan 10 2014(Updated: )
It was discovered that the CORBA component of OpenJDK failed to properly perform security checks IIOP input streams. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.4 | 2.4.4 |
redhat/icedtea | <2.3.13 | 2.3.13 |
redhat/icedtea | <1.12.8 | 1.12.8 |
redhat/icedtea | <1.13.1 | 1.13.1 |
Oracle Java SE 7 | =1.6.0-update65 | |
Oracle JRE | =1.6.0-update65 | |
Oracle Java SE 7 | =1.5.0-update55 | |
Oracle JRE | =1.5.0-update55 | |
Oracle JRE | =1.7.0-update45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0428 is rated as a high severity vulnerability due to the potential to bypass security restrictions.
To fix CVE-2014-0428, ensure that you update to the latest version of the affected software, specifically patched versions of IcedTea or Oracle JDK.
CVE-2014-0428 affects multiple versions of Oracle JDK and JRE including 1.5.0 update 55, 1.6.0 update 65, and 1.7.0 update 45.
Yes, CVE-2014-0428 can potentially be exploited by untrusted Java applications or applets to bypass Java sandbox restrictions.
Disabling Java or ensuring that Java content runs in a secure environment can serve as a temporary workaround for CVE-2014-0428 until patches are applied.