First published: Mon Apr 14 2014(Updated: )
It was discovered that FlavorMaps were not properly seperated between different AppContexts. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <1.13.3 | 1.13.3 |
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Oracle OpenJDK 1.8.0 | =1.5.0-update61 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update71 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update51 | |
Oracle OpenJDK 1.8.0 | =1.8.0 | |
Oracle JRE | =1.5.0-update61 | |
Oracle JRE | =1.6.0-update71 | |
Oracle JRE | =1.7.0-update51 | |
Oracle JRE | =1.8.0 | |
Debian | =6.0 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0451 is classified as a high severity vulnerability due to its potential to bypass Java sandbox restrictions.
To fix CVE-2014-0451, update your Java installation to the latest version or apply the necessary security patches.
CVE-2014-0451 affects various versions of Oracle Java SE and Java SE Embedded, including 5.0u61, 6u71, 7u51, and 8.
Yes, CVE-2014-0451 can be exploited remotely by untrusted Java applications or applets.
You should check for CVE-2014-0451 vulnerabilities on platforms like Ubuntu, Debian, and systems running Oracle Java.