// For flags

CVE-2014-4209

OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755)

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality and integrity via vectors related to JMX.

Vulnerabilidad no especificada en Oracle Java SE 5.0u65, 6u75, 7u60 y 8u5 permite a atacantes remotos afecatr la confidencialidad e integridad a través de vectores relacionados con JMX.

It was discovered that the Hotspot component in OpenJDK did not properly verify bytecode from the class files. An untrusted Java application or applet could possibly use these flaws to bypass Java sandbox restrictions. A format string flaw was discovered in the Hotspot component event logger in OpenJDK. An untrusted Java application or applet could use this flaw to crash the Java Virtual Machine or, potentially, execute arbitrary code with the privileges of the Java Virtual Machine. Multiple improper permission check issues were discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions ,. Multiple flaws were discovered in the JMX, Libraries, Security, and Serviceability components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. It was discovered that the RSA algorithm in the Security component in OpenJDK did not sufficiently perform blinding while performing operations that were using private keys. An attacker able to measure timing differences of those operations could possibly leak information about the used keys. The Diffie-Hellman key exchange algorithm implementation in the Security component in OpenJDK failed to validate public DH parameters properly. This could cause OpenJDK to accept and use weak parameters, allowing an attacker to recover the negotiated key. This update is based on IcedTea version 2.5.1, which fixes these issues, as well as several others.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-06-17 CVE Reserved
  • 2014-07-16 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-04-03 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (39)
URL Tag Source
http://seclists.org/fulldisclosure/2014/Dec/23 Mailing List
http://secunia.com/advisories/59404 Third Party Advisory
http://secunia.com/advisories/59680 Third Party Advisory
http://secunia.com/advisories/59924 Third Party Advisory
http://secunia.com/advisories/59985 Third Party Advisory
http://secunia.com/advisories/59986 Third Party Advisory
http://secunia.com/advisories/59987 Third Party Advisory
http://secunia.com/advisories/60081 Third Party Advisory
http://secunia.com/advisories/60129 Third Party Advisory
http://secunia.com/advisories/60245 Third Party Advisory
http://secunia.com/advisories/60317 Third Party Advisory
http://secunia.com/advisories/60485 Third Party Advisory
http://secunia.com/advisories/60622 Third Party Advisory
http://secunia.com/advisories/60812 Third Party Advisory
http://secunia.com/advisories/60817 Third Party Advisory
http://secunia.com/advisories/61577 Third Party Advisory
http://secunia.com/advisories/61640 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21680334 X_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21686383 X_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21686824 X_refsource_confirm
http://www.securityfocus.com/archive/1/534161/100/0/threaded Mailing List
http://www.securityfocus.com/bid/68639 Vdb Entry
http://www.securitytracker.com/id/1030577 Vdb Entry
http://www.vmware.com/security/advisories/VMSA-2014-0012.html X_refsource_confirm
https://exchange.xforce.ibmcloud.com/vulnerabilities/94596 Vdb Entry
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.5.0
Search vendor "Oracle" for product "Jdk" and version "1.5.0"
update65
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.6.0
Search vendor "Oracle" for product "Jdk" and version "1.6.0"
update75
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.7.0
Search vendor "Oracle" for product "Jdk" and version "1.7.0"
update60
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.8.0
Search vendor "Oracle" for product "Jdk" and version "1.8.0"
update5
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.5.0
Search vendor "Oracle" for product "Jre" and version "1.5.0"
update65
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.6.0
Search vendor "Oracle" for product "Jre" and version "1.6.0"
update75
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.7.0
Search vendor "Oracle" for product "Jre" and version "1.7.0"
update60
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.8.0
Search vendor "Oracle" for product "Jre" and version "1.8.0"
update5
Affected