First published: Mon Oct 19 2015(Updated: )
It was discovered that the IIOPInputStream class in the CORBA component of OpenJDK failed to properly check object and field types during object deserialization. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java SE 7 | =1.6.0-update101 | |
Oracle Java SE 7 | =1.7.0-update85 | |
Oracle Java SE 7 | =1.8.0-update51 | |
Oracle Java SE 7 | =1.8.0-update60 | |
Oracle JRE | =1.6.0-update_101 | |
Oracle JRE | =1.7.0-update_85 | |
Oracle JRE | =1.8.0-update_51 | |
Oracle JRE | =1.8.0-update_60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4881 has a severity rating that indicates it can lead to serious security vulnerabilities, allowing untrusted applications to bypass security restrictions.
To mitigate CVE-2015-4881, it is recommended to update to the latest version of Oracle JDK or JRE that addresses this vulnerability.
CVE-2015-4881 affects multiple versions, including Oracle JDK 1.6.0-update101, 1.7.0-update85, and 1.8.0-update51 and 1.8.0-update60.
CVE-2015-4881 allows an attacker to exploit deserialization flaws, potentially executing untrusted code within the Java environment.
Yes, CVE-2015-4881 is particularly relevant to Java developers and system administrators who use the affected versions, as it can compromise application security.