First published: Mon Jan 16 2017(Updated: )
An insecure class construction flaw, related to the incorrect handling of exception stack frames, was found in the Hotspot component of OpenJDK. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-8 | 8u442-ga-2 | |
Oracle Java SE 7 | =1.7-update_121 | |
Oracle Java SE 7 | =1.8-update_111 | |
Oracle Java SE 7 | =1.8-update_112 | |
Oracle JRE | =1.7-update_121 | |
Oracle JRE | =1.8-update_111 | |
Oracle JRE | =1.8-update_112 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3289 is considered a critical vulnerability due to its potential to bypass Java sandbox restrictions.
To fix CVE-2017-3289, upgrade to OpenJDK 8u442-ga-2 or a later version.
CVE-2017-3289 affects Oracle JDK 1.7 update 121 and Oracle JDK 1.8 updates 111 and 112.
CVE-2017-3289 allows untrusted Java applications to bypass security restrictions, potentially compromising the system.
CVE-2017-3289 affects the Hotspot component of OpenJDK and is relevant across different platforms that run vulnerable versions.