First published: Mon Apr 14 2014(Updated: )
It was discovered that the system logger was not properly protected against using handlers of custom loggers created prior to the system logger. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <1.13.3 | 1.13.3 |
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Ubuntu Linux | =14.04 | |
Oracle JDK 6 | =1.5.0-update61 | |
Oracle JDK 6 | =1.6.0-update71 | |
Oracle JDK 6 | =1.7.0-update51 | |
Oracle JDK 6 | =1.8.0 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update61 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update71 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update51 | |
Oracle Java Runtime Environment (JRE) | =1.8.0 | |
Debian GNU/Linux | =6.0 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0446 is generally considered a high severity vulnerability due to its potential to bypass Java sandbox restrictions.
To fix CVE-2014-0446, upgrade to the patched versions of the affected packages, such as icedtea 1.13.3 or 2.4.7.
CVE-2014-0446 affects various versions of Oracle Java SE, including JDK and JRE from 1.5.0 to 1.8.0, as well as multiple versions of icedtea.
Yes, CVE-2014-0446 can potentially be exploited remotely by untrusted Java applications or applets.
The impact of CVE-2014-0446 includes potential unauthorized access and control over the system by bypassing security restrictions.