Lucene search

K
archlinuxArch LinuxASA-201604-2
HistoryApr 01, 2016 - 12:00 a.m.

jre7-openjdk: sandbox escape

2016-04-0100:00:00
Arch Linux
lists.archlinux.org
29

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.039 Low

EPSS

Percentile

91.0%

It was discovered that the security fix for CVE-2013-5838 was incomplete
and still allowed remote attackers to escape the Java security sandbox
mechanism.
The root problem is that the Reflection API does not properly guarantee
type safety when Method Handle objects were invoked across two different
Class Loader namespaces.
A part of the original patch was to use the "loadersAreRelated()" method
to ensure that the two Class Loaders are related, which is a condition
for correct type safety.
However, this condition could be easily fulfilled by abusing certain
behaviors in the class loading process, which could allow an attacker
to bypass the type safety checks and ultimately escape the security
sandbox mechanism.

OSVersionArchitecturePackageVersionFilename
anyanyanyjre7-openjdk< 7.u99_2.6.5-1UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.039 Low

EPSS

Percentile

91.0%