First published: Mon Oct 19 2015(Updated: )
It was discovered that the IIOPInputStream class in the CORBA component of OpenJDK failed to properly check object and field types during object deserialization. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update101 | |
Oracle JDK | =1.7.0-update85 | |
Oracle JDK | =1.8.0-update51 | |
Oracle JDK | =1.8.0-update60 | |
Oracle JRE | =1.6.0-update_101 | |
Oracle JRE | =1.7.0-update_85 | |
Oracle JRE | =1.8.0-update_51 | |
Oracle JRE | =1.8.0-update_60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.