First published: Mon Jul 18 2016(Updated: )
It was discovered that the CORBA component of OpenJDK did not sufficiently restrict the use of custom ValueHandler when performing object deserialization. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java SE 7 | =1.6.0-update115 | |
Oracle Java SE 7 | =1.7.0-update101 | |
Oracle Java SE 7 | =1.8.0-update92 | |
Oracle JRE | =1.6.0-update115 | |
Oracle JRE | =1.7.0-update101 | |
Oracle JRE | =1.8.0-update92 | |
Oracle Linux | =5.0 | |
Oracle Linux | =6 | |
Oracle Linux | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3458 has been classified as a high severity vulnerability due to its potential to allow untrusted applications to bypass Java sandbox restrictions.
To fix CVE-2016-3458, update your OpenJDK or Oracle JDK versions to the latest available release that addresses this vulnerability.
CVE-2016-3458 affects Oracle JDK versions 1.6.0-update115, 1.7.0-update101, and 1.8.0-update92, as well as their corresponding JRE versions.
CVE-2016-3458 allows untrusted Java applications to exploit the CORBA component for object deserialization, potentially compromising system security.
There are no known effective workarounds for CVE-2016-3458, so applying the appropriate updates is strongly recommended.