First published: Mon Apr 14 2014(Updated: )
It was discovered that Java Sound provider caching mechanism is insecure. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <1.13.3 | 1.13.3 |
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Oracle OpenJDK 1.8.0 | =1.5.0-update61 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update71 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update51 | |
Oracle OpenJDK 1.8.0 | =1.8.0 | |
Oracle JRE | =1.5.0-update61 | |
Oracle JRE | =1.6.0-update71 | |
Oracle JRE | =1.7.0-update51 | |
Oracle JRE | =1.8.0 | |
Debian | =6.0 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2427 is rated as a high severity vulnerability due to its potential to bypass Java sandbox restrictions.
To fix CVE-2014-2427, update to the recommended versions of the affected software as specified by your software vendor.
CVE-2014-2427 affects multiple versions of Oracle Java SE, Oracle JRE, and various distributions of the IcedTea package.
Yes, CVE-2014-2427 can be exploited remotely by an untrusted Java application or applet.
CVE-2014-2427 impacts multiple platforms including various versions of Oracle JDK, JRE, and Linux distributions such as Ubuntu and Debian.