First published: Mon Apr 14 2014(Updated: )
It was discovered that JAXWS incorrectly cached certain data initialized via thread context class loaders. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <1.13.3 | 1.13.3 |
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Oracle Java SE 7 | =1.6.0-update71 | |
Oracle Java SE 7 | =1.7.0-update51 | |
Oracle Java SE 7 | =1.8.0 | |
Oracle JRE | =1.6.0-update71 | |
Oracle JRE | =1.7.0-update51 | |
Oracle JRE | =1.8.0 | |
Debian Linux | =6.0 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
=10.04 | ||
=12.04 | ||
=12.10 | ||
=13.10 | ||
=14.04 | ||
=1.6.0-update71 | ||
=1.7.0-update51 | ||
=1.8.0 | ||
=1.6.0-update71 | ||
=1.7.0-update51 | ||
=1.8.0 | ||
=6.0 | ||
=7.0 | ||
=8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0452 has been assigned a medium severity rating due to its potential impact on Java applications.
To fix CVE-2014-0452, upgrade your Java version to a release that addresses this vulnerability.
CVE-2014-0452 affects Oracle Java SE versions 6u71, 7u51, and 8, as well as certain versions of IcedTea and specific Debian and Ubuntu releases.
Yes, CVE-2014-0452 could allow an untrusted Java application to bypass sandbox restrictions if successfully exploited.
The best approach is to update to the latest version of Java, although disabling the Java plugin in browsers can serve as a temporary workaround.