First published: Mon Apr 14 2014(Updated: )
It was discovered that NIO channels were not properly separated across threads. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Oracle Java SE 7 | =1.7.0-update51 | |
Oracle Java SE 7 | =1.8.0 | |
Oracle JRE | =1.7.0-update51 | |
Oracle JRE | =1.8.0 | |
=12.10 | ||
=13.10 | ||
=14.04 | ||
=1.7.0-update51 | ||
=1.8.0 | ||
=1.7.0-update51 | ||
=1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2402 is considered a high-severity vulnerability due to its potential to bypass Java sandbox restrictions.
To fix CVE-2014-2402, update to the latest version of Oracle Java or apply the necessary security patches provided by your distribution.
CVE-2014-2402 affects Oracle Java SE 7u51 and 8, as well as Java SE Embedded 7u51.
Yes, CVE-2014-2402 can be exploited remotely by an untrusted Java application or applet.
Any application using the affected versions of Oracle Java, particularly those allowing untrusted applet execution, is at risk due to CVE-2014-2402.