First published: Mon Jul 13 2015(Updated: )
It was discovered that the RMIConnectionImpl class in the JMX component of OpenJDK failed to properly check code permissions when creating repository class loaders. An untrusted Java application or applet could use this flaw to read information access to which should be restricted by the Java sandbox, partially bypassing sandbox restrictions.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update95 | |
Oracle JDK | =1.7.0-update75 | |
Oracle JDK | =1.7.0-update80 | |
Oracle JDK | =1.8.0-update_33 | |
Oracle JDK | =1.8.0-update45 | |
Oracle JRE | =1.6.0-update_95 | |
Oracle JRE | =1.7.0-update_75 | |
Oracle JRE | =1.7.0-update_80 | |
Oracle JRE | =1.8.0-update_33 | |
Oracle JRE | =1.8.0-update_45 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-2621 is medium.
Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 are affected by CVE-2015-2621.
Remote attackers can exploit CVE-2015-2621 to affect confidentiality through vectors related to JMX.
You can find more information about CVE-2015-2621 at the following references: [Oracle Advisory](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA), [Red Hat Advisory 1](https://rhn.redhat.com/errata/RHSA-2015-1230.html), [Red Hat Advisory 2](https://rhn.redhat.com/errata/RHSA-2015-1229.html).
The severity of the vulnerability in Oracle Java SE is medium.