First published: Sun Jul 12 2015(Updated: )
It was discovered that the IIOPInputStream class in the CORBA component in OpenJDK failed to properly check object field types. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update95 | |
Oracle JDK | =1.7.0-update75 | |
Oracle JDK | =1.7.0-update80 | |
Oracle JDK | =1.8.0-update_33 | |
Oracle JDK | =1.8.0-update45 | |
Oracle JRE | =1.6.0-update_95 | |
Oracle JRE | =1.7.0-update_75 | |
Oracle JRE | =1.7.0-update_80 | |
Oracle JRE | =1.8.0-update_33 | |
Oracle JRE | =1.8.0-update_45 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-2628 is critical with a severity value of 10.
Oracle Java SE 6u95, 7u80, and 8u45, as well as Java SE Embedded 7u75 and 8u33 are affected.
Remote attackers can exploit CVE-2015-2628 through vectors related to CORBA.
You can remedy CVE-2015-2628 on Ubuntu by updating to OpenJDK 6u96, 7u85, or 8u51.
You can find the reference links for CVE-2015-2628 [here](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA) and [here](https://rhn.redhat.com/errata/RHSA-2015-1230.html).