First published: Tue Oct 20 2015(Updated: )
It was discovered that the RemoteObjectInvocationHandler class in the RMI component of OpenJDK did not check if object proxy is an instance of a proxy class and that it uses correct invocation handler. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions by gaining access to data that should by protected by the sandbox.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java SE 7 | =1.6.0-update101 | |
Oracle Java SE 7 | =1.7.0-update85 | |
Oracle Java SE 7 | =1.8.0-update51 | |
Oracle Java SE 7 | =1.8.0-update60 | |
Oracle JRE | =1.6.0-update_101 | |
Oracle JRE | =1.7.0-update_85 | |
Oracle JRE | =1.8.0-update_51 | |
Oracle JRE | =1.8.0-update_60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4903 is rated as a high severity vulnerability due to its potential to allow untrusted applications to bypass security protections.
To fix CVE-2015-4903, it's recommended to update to a version of the Oracle JDK or JRE that addresses this vulnerability.
CVE-2015-4903 affects Oracle JDK versions 1.6.0-update101, 1.7.0-update85, and 1.8.0-update51 and update60, along with corresponding JRE versions.
CVE-2015-4903 could allow an untrusted Java application to bypass Java sandbox restrictions and execute arbitrary code.
CVE-2015-4903 is considered a remote vulnerability as it can be exploited through untrusted applications or applets running over a network.