First published: Mon Jan 16 2017(Updated: )
It was discovered that the atomic field updaters in the in the java.util.concurrent.atomic package in the Libraries component of OpenJDK did not properly restrict access to protected field members. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-8 | 8u442-ga-2 | |
Oracle Java SE 7 | =1.6-update_131 | |
Oracle Java SE 7 | =1.7-update_121 | |
Oracle Java SE 7 | =1.8-update_111 | |
Oracle Java SE 7 | =1.8-update_112 | |
Oracle JRE | =1.6-update_131 | |
Oracle JRE | =1.7-update_121 | |
Oracle JRE | =1.8-update_111 | |
Oracle JRE | =1.8-update_112 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3272 is considered a high severity vulnerability.
To fix CVE-2017-3272, update to the latest version of OpenJDK or Oracle JDK that contains the relevant security patches.
CVE-2017-3272 affects OpenJDK 8u432-b06-2 and Oracle JDK versions 1.6-update_131, 1.7-update_121, and 1.8-update_111 and 1.8-update_112.
CVE-2017-3272 allows untrusted Java applications or applets to bypass Java sandbox restrictions, potentially leading to unauthorized access.
The attack vector for CVE-2017-3272 is through the execution of untrusted Java applications or applets that exploit the improper access controls.