First published: Tue Jul 15 2014(Updated: )
It was discovered that the Libraries component did not properly handle method invocations with an exhausted rank. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java SE 7 | =1.7.0-update60 | |
Oracle JRE | =1.7.0-update60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4223 has a moderate severity rating due to its potential to allow untrusted Java applications to bypass security restrictions.
To fix CVE-2014-4223, update to the latest version of Oracle Java SE or JDK that addresses this vulnerability.
CVE-2014-4223 affects Oracle JDK and JRE version 1.7.0-update60.
Yes, CVE-2014-4223 can potentially be exploited remotely by an attacker using an untrusted Java application.
The implications of CVE-2014-4223 include the possibility of unauthorized access and execution of code due to bypassing sandbox restrictions.