First published: Mon Apr 14 2014(Updated: )
It was discovered that direct method handles are not properly protected against a certain use case. An untrusted Java application or applet could possibly use this flaw to bypass call hierachies.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Oracle Java SE 7 | =1.7.0-update51 | |
Oracle Java SE 7 | =1.8.0 | |
Oracle JRE | =1.7.0-update51 | |
Oracle JRE | =1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2413 is considered a moderate severity vulnerability allowing potential bypass of call hierarchies in Java applications.
To fix CVE-2014-2413, update your Oracle Java SE and JRE to the latest versions or apply the relevant patches provided by your operating system vendor.
CVE-2014-2413 affects Oracle Java SE 7u51, 8, and several versions within Oracle's JDK and JRE, as well as related packages in various Linux distributions.
Yes, CVE-2014-2413 can potentially be exploited remotely by untrusted Java applications or applets.
Products impacted by CVE-2014-2413 include Oracle JDK, Oracle JRE, as well as IcedTea packages on specific Linux distributions.