First published: Mon Jul 14 2014(Updated: )
It was discovered that MethodHandles.Lookup did not properly check for "protected" modifier, making it possible to access protected constructors in a different package. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.7.0-update60 | |
Oracle JDK 6 | =1.8.0-update5 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update60 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4221 is classified as a high severity vulnerability due to its potential to bypass Java sandbox restrictions.
To fix CVE-2014-4221, update to the latest version of Oracle JDK or JRE that addresses this vulnerability.
CVE-2014-4221 affects Oracle JDK 1.7.0-update60 and 1.8.0-update5, as well as corresponding JRE versions.
CVE-2014-4221 can impact untrusted Java applications or applets that attempt to access protected constructors across packages.
CVE-2014-4221 can lead to unauthorized access and manipulation of protected resources, undermining the security model of Java.