First published: Sun Jul 12 2015(Updated: )
It was discovered that the JMX component in OpenJDK failed to properly handle MBean connection proxy classes. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update95 | |
Oracle JDK | =1.7.0-update80 | |
Oracle JDK | =1.8.0-update_33 | |
Oracle JDK | =1.8.0-update45 | |
Oracle JRE | =1.6.0-update_95 | |
Oracle JRE | =1.7.0-update_80 | |
Oracle JRE | =1.8.0-update_33 | |
Oracle JRE | =1.8.0-update_45 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2015-4731.
Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 are affected by this vulnerability.
The severity of CVE-2015-4731 is critical.
This vulnerability allows remote attackers to affect confidentiality, integrity, and availability.
More information about this vulnerability can be found at the following references: [Reference 1](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA), [Reference 2](https://rhn.redhat.com/errata/RHSA-2015-1230.html), [Reference 3](https://rhn.redhat.com/errata/RHSA-2015-1229.html).