First published: Tue Jul 15 2014(Updated: )
It was discovered that the Hotspot component did not properly parse invalid generic attributes for fields and methods. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.5.0-update65 | |
Oracle JDK 6 | =1.6.0-update75 | |
Oracle JDK 6 | =1.7.0-update60 | |
Oracle JDK 6 | =1.8.0-update5 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update75 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update60 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4216 has a severity rating of high due to its potential for exploitation by untrusted Java applications.
To fix CVE-2014-4216, update your Java installation to the latest version provided by Oracle.
CVE-2014-4216 affects Oracle JDK versions 1.5.0-update65, 1.6.0-update75, 1.7.0-update60, and 1.8.0-update5 as well as the corresponding Java Runtime Environment (JRE) versions.
CVE-2014-4216 allows a potential bypass of Java sandbox restrictions, which could lead to unauthorized actions by untrusted applications.
While CVE-2014-4216 is less of a threat today due to patches, any systems running outdated versions of Java remain at risk.