First published: Tue Jul 15 2014(Updated: )
It was discovered that the Libraries component did not properly clone the interface array before passing it to proxy methods. An untrusted Java application or applet could possibly use this flaw to bypass intended security restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.5.0-update65 | |
Oracle JDK 6 | =1.6.0-update75 | |
Oracle JDK 6 | =1.7.0-update60 | |
Oracle JDK 6 | =1.8.0-update5 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update65 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update75 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update60 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4218 has been classified as a critical vulnerability due to its potential to allow unauthorized access to sensitive data.
To fix CVE-2014-4218, it is recommended to update to the latest version of Oracle JDK or JRE that addresses this vulnerability.
CVE-2014-4218 affects Oracle JDK and JRE versions 1.5.0-update65, 1.6.0-update75, 1.7.0-update60, and 1.8.0-update5.
CVE-2014-4218 can be exploited by untrusted Java applications or applets to bypass security restrictions.
Yes, CVE-2014-4218 is specifically related to Java security, as it involves improper handling of interface arrays leading to potential security breaches.