First published: Sun Jul 12 2015(Updated: )
It was discovered that the RemoteObjectInvocationHandler class in the RMI component of OpenJDK did not prevent calls to the finalize() method. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. The patch prevents calls of the finalize() method. It also makes it possible to re-enable support for calling the method via the sun.rmi.server.invocationhandler.allowFinalizeInvocation system property.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update95 | |
Oracle JDK | =1.7.0-update75 | |
Oracle JDK | =1.7.0-update80 | |
Oracle JDK | =1.8.0-update_33 | |
Oracle JDK | =1.8.0-update45 | |
Oracle JRE | =1.6.0-update_95 | |
Oracle JRE | =1.7.0-update_75 | |
Oracle JRE | =1.7.0-update_80 | |
Oracle JRE | =1.8.0-update_33 | |
Oracle JRE | =1.8.0-update_45 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-4733 is critical.
CVE-2015-4733 affects Oracle Java SE versions 6u95, 7u80, and 8u45, as well as Java SE Embedded versions 7u75 and 8u33.
CVE-2015-4733 can affect confidentiality, integrity, and availability of the system.
To mitigate the vulnerability in Oracle Java SE, it is recommended to apply the relevant security updates provided by Oracle or the respective Linux distributions.
For more information about CVE-2015-4733, you can refer to the Oracle Security Advisory and the Red Hat Security Advisories linked in the references section.