First published: Thu Jan 28 2016(Updated: )
The following flaw was reported for IBM JDK: A flaw in the IBM J9 JVM allows code to invoke non-public interface methods under certain circumstances. Untrusted code could potentially exploit this. This could lead to sensitive data being exposed to an attacker, or the attacker being able to inject bad data. <a href="http://www-01.ibm.com/support/docview.wss?uid=swg21974193">http://www-01.ibm.com/support/docview.wss?uid=swg21974193</a> <a href="http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_January_2016">http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_January_2016</a> This flaw could allow an untrusted Java application or applet to bypass certain Java sandbox restrictions. Issue was fixed in IBM JDK 6 SR16-FP20, 7 SR9-FP30, 7R1 SR3-FP30, and 8 SR2-FP10.
Affected Software | Affected Version | How to fix |
---|---|---|
IBM JDK 8 | <6 SR16-FP20 | |
IBM JDK 8 | <7 SR9-FP30 | |
IBM JDK 8 | <7R1 SR3-FP30 | |
IBM JDK 8 | <8 SR2-FP10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1302689 is classified as a high severity flaw that could lead to sensitive data exposure.
To fix REDHAT-BUG-1302689, upgrade your IBM JDK to the latest version that is not affected by this vulnerability.
REDHAT-BUG-1302689 affects specific versions of IBM JDK including versions up to 6 SR16-FP20, 7 SR9-FP30, and 8 SR2-FP10.
Developers and organizations using the affected versions of IBM JDK are at risk from the vulnerability REDHAT-BUG-1302689.
Yes, the vulnerability REDHAT-BUG-1302689 allows untrusted code to potentially exploit the flaw, which could lead to remote code execution.