First published: Tue Oct 20 2015(Updated: )
It was discovered that the DGCClient (for RMI distributed garbage-collection - DGC) class in the RMI component of OpenJDK failed to use restricted access control context when handling JRMP (Java Remote Method Protocol) messages. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6.0-update101 | |
Oracle JDK 6 | =1.7.0-update85 | |
Oracle JDK 6 | =1.8.0-update51 | |
Oracle JDK 6 | =1.8.0-update60 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update_101 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update_85 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update_51 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update_60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4883 is considered a critical vulnerability due to its potential to allow untrusted Java applications to bypass access controls.
To fix CVE-2015-4883, it is recommended to update to a version of Oracle JDK or JRE that is not affected by this vulnerability.
CVE-2015-4883 affects Oracle JDK 6 update 101, JDK 7 update 85, and JDK 8 updates 51 and 60, as well as their corresponding JRE versions.
An untrusted Java application or applet can exploit CVE-2015-4883 to bypass restrictions enforced by the RMI component of OpenJDK.
CVE-2015-4883 primarily affects applications running on the Java platform provided by Oracle, particularly those using RMI.