First published: Tue Jul 15 2014(Updated: )
It was discovered that the bytecode verification did not properly prevent ctor calls to this() and super() from certain code constructs. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java SE 7 | =1.6.0-update75 | |
Oracle Java SE 7 | =1.7.0-update60 | |
Oracle Java SE 7 | =1.8.0-update5 | |
Oracle JRE | =1.6.0-update75 | |
Oracle JRE | =1.7.0-update60 | |
Oracle JRE | =1.8.0-update5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4219 has a high severity rating as it allows untrusted Java applications to bypass sandbox restrictions.
To fix CVE-2014-4219, update to the latest version of Oracle Java SE or apply the relevant security patches provided by Oracle.
CVE-2014-4219 affects multiple versions of Oracle JDK and JRE, specifically versions 1.6.0-update75, 1.7.0-update60, and 1.8.0-update5.
CVE-2014-4219 is a code execution vulnerability that arises due to improper bytecode verification in Java.
Even after patching CVE-2014-4219, it is advisable to avoid running untrusted Java applications to minimize security risks.