First published: Mon Oct 14 2019(Updated: )
It was discovered that Socket and ServerSocket classes in the Networking component in OpenJDK did not restrict creation of subclasses with custom SocketImpl. A specially crafted Java application or applet could use this flaw to bypass certain Java sandbox restriction. The fix for this issue introduces new NetPermission named setSocketImpl which controls the ability to use custom SocketImpl.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1761596 is classified as critical due to its potential to bypass Java sandbox restrictions.
To fix REDHAT-BUG-1761596, update to the latest version of OpenJDK that addresses this vulnerability.
The potential risks of REDHAT-BUG-1761596 include unauthorized access and execution of malicious code within the Java environment.
OpenJDK 17 is specifically mentioned as being affected by REDHAT-BUG-1761596.
Yes, if your applications utilize OpenJDK, they could be at risk due to the vulnerability described in REDHAT-BUG-1761596.