First published: Fri Apr 15 2016(Updated: )
It was discovered that the ObjectInputStream class in the Serialization component of OpenJDK failed to properly ensure thread consistency when deserializing serialized input. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6.0-update113 | |
Oracle JDK 6 | =1.7.0-update99 | |
Oracle JDK 6 | =1.8.0-update77 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update113 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update99 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update77 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0686 is classified as a high severity vulnerability due to its potential to allow untrusted Java applications to bypass sandbox restrictions.
To fix CVE-2016-0686, update to the latest version of the Oracle JDK or JRE that contains the security patch addressing this vulnerability.
CVE-2016-0686 affects Oracle JDK versions 1.6.0-update113, 1.7.0-update99, and 1.8.0-update77 as well as corresponding Oracle JRE versions.
An attacker could exploit CVE-2016-0686 to perform unauthorized operations by sending crafted serialized data to an untrusted Java application.
CVE-2016-0686 can impact any environment running the affected versions of Oracle JDK or JRE, making it a concern for both enterprise and personal systems.