First published: Fri Apr 15 2016(Updated: )
It was discovered that the Hotspot component of OpenJDK did not properly handle byte types. An untrusted Java application or applet could use this flaw to corrupt Java virtual machine memory and possibly execute arbitrary code, bypassing Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6.0-update113 | |
Oracle JDK 6 | =1.7.0-update99 | |
Oracle JDK 6 | =1.8.0-update77 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update113 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update99 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update77 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0687 is classified as a critical vulnerability that could allow an attacker to execute arbitrary code.
To fix CVE-2016-0687, update your Oracle JDK or JRE to the latest version available from Oracle.
CVE-2016-0687 affects Oracle JDK versions 1.6.0-update113, 1.7.0-update99, and 1.8.0-update77, as well as corresponding JRE versions.
CVE-2016-0687 exploits a flaw in the Hotspot component of OpenJDK that mishandles byte types.
There are no effective workarounds for CVE-2016-0687 other than applying the official patches provided by Oracle.