// For flags

CVE-2014-8892

JDK: unspecified partial Java sandbox bypass fixed in Feb 2015 update

Severity Score

5.9
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via unspecified vectors related to the security manager.

Vulnerabilidad no especificada en Java Virtual Machine (JVM) en IBM SDK, Java Technology Edition 5.0 anterior a SR16-FP9, 6 anterior a SR16-FP3, 6R1 anterior a SR8-FP3, 7 anterior a SR8-FP10, y 7R1 anterior a SR2-FP10 permite a atacantes remotos evadir los permisos de acceso y obtener información sensible a través de vectores no especificados relacionados con el gestor de seguridad.

This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Satellite 5.7. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. Several flaws were fixed in the IBM Java 2 Runtime Environment. Users of Red Hat Satellite 5.7 are advised to upgrade to these updated packages, which contain the IBM Java SE 6 SR16-FP3 release. For this update to take effect, Red Hat Satellite must be restarted, as well as all running instances of IBM Java.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-11-14 CVE Reserved
  • 2015-02-05 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ibm
Search vendor "Ibm"
Java Sdk
Search vendor "Ibm" for product "Java Sdk"
>= 5.0.0.0 <= 5.0.16.8
Search vendor "Ibm" for product "Java Sdk" and version " >= 5.0.0.0 <= 5.0.16.8"
technology
Affected
Ibm
Search vendor "Ibm"
Java Sdk
Search vendor "Ibm" for product "Java Sdk"
>= 6.0.0.0 < 6.0.16.3
Search vendor "Ibm" for product "Java Sdk" and version " >= 6.0.0.0 < 6.0.16.3"
technology
Affected
Ibm
Search vendor "Ibm"
Java Sdk
Search vendor "Ibm" for product "Java Sdk"
>= 6.1.0.0 <= 6.1.8.2
Search vendor "Ibm" for product "Java Sdk" and version " >= 6.1.0.0 <= 6.1.8.2"
technology
Affected
Ibm
Search vendor "Ibm"
Java Sdk
Search vendor "Ibm" for product "Java Sdk"
>= 7.0.0.0 < 7.0.8.10
Search vendor "Ibm" for product "Java Sdk" and version " >= 7.0.0.0 < 7.0.8.10"
technology
Affected
Ibm
Search vendor "Ibm"
Java Sdk
Search vendor "Ibm" for product "Java Sdk"
>= 7.1.0.0 < 7.1.2.10
Search vendor "Ibm" for product "Java Sdk" and version " >= 7.1.0.0 < 7.1.2.10"
technology
Affected