First published: Mon Apr 14 2014(Updated: )
It was discovered that JAXB incorrectly cached certain data initialized via thread context class loaders. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <1.13.3 | 1.13.3 |
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Ubuntu Linux | =14.04 | |
Oracle JDK 6 | =1.6.0-update71 | |
Oracle JDK 6 | =1.7.0-update51 | |
Oracle JDK 6 | =1.8.0 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update71 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update51 | |
Oracle Java Runtime Environment (JRE) | =1.8.0 | |
Debian GNU/Linux | =6.0 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2414 is classified as a high severity vulnerability that can potentially allow untrusted Java applications to bypass sandbox restrictions.
To mitigate CVE-2014-2414, upgrade to patched versions of affected software, such as IcedTea 1.13.3 or 2.4.7, or update your Oracle JDK/JRE to the latest version.
CVE-2014-2414 affects various versions of Oracle Java SE, Oracle JDK, IcedTea, and specific Debian and Ubuntu Linux distributions.
No, CVE-2014-2414 specifically impacts applications that rely on JAXB and use thread context class loaders to cache data.
Exploiting CVE-2014-2414 could allow an attacker to execute malicious code outside of the Java security sandbox, compromising system security.