First published: Fri Jul 15 2016(Updated: )
It was discovered that the filterReturnValue() method of the MethodHandles in the Libraries component of OpenJDK did not properly check filter MethodHandle parameter count. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.8.0-update91 | |
Oracle JDK 6 | =1.8.0-update92 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update91 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update92 | |
Oracle Linux | =5.0 | |
Oracle Linux | =6 | |
Oracle Linux | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3610 is categorized as a medium severity vulnerability.
To fix CVE-2016-3610, update to the latest version of the affected JDK or JRE as provided by Oracle.
CVE-2016-3610 affects Oracle JDK versions 1.8.0-update91 and 1.8.0-update92, and Oracle JRE versions 1.8.0-update91 and 1.8.0-update92.
CVE-2016-3610 is a security vulnerability that allows untrusted Java applications to bypass sandbox restrictions.
If exploited, CVE-2016-3610 could allow an untrusted application to execute arbitrary code on the host system.