First published: Mon Apr 14 2014(Updated: )
It was discovered that JAXWS incorrectly cached certain data initialized via thread context class loaders. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <1.13.3 | 1.13.3 |
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update71 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update51 | |
Oracle OpenJDK 1.8.0 | =1.8.0 | |
Oracle JRE | =1.6.0-update71 | |
Oracle JRE | =1.7.0-update51 | |
Oracle JRE | =1.8.0 | |
Debian | =6.0 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2423 allows untrusted Java applications or applets to bypass Java sandbox restrictions, potentially compromising security.
To mitigate CVE-2014-2423, users should upgrade to versions of Oracle Java SE that are patched against this vulnerability.
CVE-2014-2423 affects Oracle Java SE versions 6u71, 7u51, and 8, along with Java SE Embedded versions.
Yes, patches are available for affected Oracle Java SE and related software versions; upgrading to the latest version will resolve this issue.
If you're using an affected version of Java, it is crucial to update to the recommended versions immediately to prevent exploitation.