First published: Mon Apr 14 2014(Updated: )
It was discovered that the class file parser did not properly parse class files with an invalid BootstrapMethods attribute length. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <1.13.3 | 1.13.3 |
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update51 | |
Oracle OpenJDK 1.8.0 | =1.8.0 | |
Oracle JRE | =1.7.0-update51 | |
Oracle JRE | =1.8.0 | |
Debian | =6.0 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2397 is considered a medium severity vulnerability due to its potential to bypass Java sandbox restrictions.
To remediate CVE-2014-2397, update your Java version to at least 1.7.0-update55 or 1.8.0 or apply the appropriate patches for your operating system.
CVE-2014-2397 is caused by improper parsing of class files with an invalid BootstrapMethods attribute length in Java applications.
CVE-2014-2397 affects Oracle Java SE 7u51 and 8, as well as various releases of IcedTea and Oracle JDK.
Yes, CVE-2014-2397 allows untrusted Java applications or applets to potentially bypass Java sandbox restrictions.