First published: Mon Oct 19 2015(Updated: )
Multiple integer overflow issues were found in the implementation of Buffers in the java.nio (Non-blocking I/O) packages in the Libraries component of OpenJDK. These could lead to out of bounds buffer access and Java Virtual Machine memory corruption. An untursted Java application or applet could use these flaws to run arbitrary code with the Java Virtual Machine privileges or bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6.0-update101 | |
Oracle JDK 6 | =1.7.0-update85 | |
Oracle JDK 6 | =1.8.0-update51 | |
Oracle JDK 6 | =1.8.0-update60 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update_101 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update_85 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update_51 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update_60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4843 is considered a high severity vulnerability due to its potential to cause out-of-bounds buffer access and memory corruption.
To fix CVE-2015-4843, you should update to a patched version of Oracle JDK or JRE that addresses the integer overflow issues.
CVE-2015-4843 affects Oracle JDK versions 1.6.0-update101, 1.7.0-update85, and 1.8.0-update60 and 1.8.0-update51, as well as corresponding JRE versions.
The potential impacts of CVE-2015-4843 include increased risk of exploitation by untrusted Java applications leading to memory corruption.
CVE-2015-4843 can be exploited by malicious Java applications or applets, making it possible for attackers to execute code remotely.