First published: Mon Apr 14 2014(Updated: )
It was discovered that the AlgorithmChecker and SignatureAndHashAlgorithm classes did not properly prevent the SIGNATURE_PRIMITIVE_SET set from being modified. An untrusted Java application or applet could possibly use this flaw to alter the content of the SIGNATURE_PRIMITIVE_SET set.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Ubuntu Linux | =14.04 | |
Oracle JDK 6 | =1.7.0-update51 | |
Oracle JDK 6 | =1.8.0 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update51 | |
Oracle Java Runtime Environment (JRE) | =1.8.0 | |
IBM Forms Viewer | >=4.0.0<4.0.0.3 | |
IBM Forms Viewer | >=8.0.0<8.0.1.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0454 is classified as a critical vulnerability due to its potential impact on the integrity of cryptographic processes.
To remediate CVE-2014-0454, upgrade to the affected software versions specified in the security advisories, such as IcedTea 2.4.7 or Oracle JDK 1.7.0-update51.
CVE-2014-0454 affects various versions of IcedTea, Oracle JDK, Oracle JRE, and IBM Forms Viewer on specific operating systems.
Yes, if your applications use the vulnerable versions of the JDK or JRE, they may be at risk of exploitation due to this vulnerability.
CVE-2014-0454 can affect operating systems running vulnerable versions of Java, such as Ubuntu 12.10, 13.10, and 14.04.