National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2013-0424 Detail

Description

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.

Source:  MITRE
Description Last Modified:  02/01/2013

Evaluator Description

Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html "Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)"

Impact

CVSS v2.0 Severity and Metrics:

Base Score: 5.0 MEDIUM
Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N) (V2 legend)
Impact Subscore: 2.9
Exploitability Subscore: 10.0


Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (AU): None
Confidentiality (C): None
Integrity (I): Partial
Availability (A): None
Additional Information:
Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS
http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/6e173569e1e7
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00034.html
http://marc.info/?l=bugtraq&m=136439120408139&w=2
http://marc.info/?l=bugtraq&m=136570436423916&w=2
http://marc.info/?l=bugtraq&m=136733161405818&w=2
http://rhn.redhat.com/errata/RHSA-2013-0236.html
http://rhn.redhat.com/errata/RHSA-2013-0237.html
http://rhn.redhat.com/errata/RHSA-2013-0245.html
http://rhn.redhat.com/errata/RHSA-2013-0246.html
http://rhn.redhat.com/errata/RHSA-2013-0247.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://rhn.redhat.com/errata/RHSA-2013-1456.html
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://www.kb.cert.org/vuls/id/858729 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html Vendor Advisory
http://www.securityfocus.com/bid/57715
http://www.us-cert.gov/cas/techalerts/TA13-032A.html US Government Resource
https://bugzilla.redhat.com/show_bug.cgi?id=906813
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16519
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19131
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19423
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19522
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.3

Configuration 1
OR
cpe:/a:oracle:jre:1.7.0
cpe:/a:oracle:jre:1.7.0:update1
cpe:/a:oracle:jre:1.7.0:update10
cpe:/a:oracle:jre:1.7.0:update11
cpe:/a:oracle:jre:1.7.0:update2
cpe:/a:oracle:jre:1.7.0:update3
cpe:/a:oracle:jre:1.7.0:update4
cpe:/a:oracle:jre:1.7.0:update5
cpe:/a:oracle:jre:1.7.0:update6
cpe:/a:oracle:jre:1.7.0:update7
cpe:/a:oracle:jre:1.7.0:update9
Configuration 2
OR
cpe:/a:oracle:jdk:1.7.0
cpe:/a:oracle:jdk:1.7.0:update1
cpe:/a:oracle:jdk:1.7.0:update10
cpe:/a:oracle:jdk:1.7.0:update11
cpe:/a:oracle:jdk:1.7.0:update2
cpe:/a:oracle:jdk:1.7.0:update3
cpe:/a:oracle:jdk:1.7.0:update4
cpe:/a:oracle:jdk:1.7.0:update5
cpe:/a:oracle:jdk:1.7.0:update6
cpe:/a:oracle:jdk:1.7.0:update7
cpe:/a:oracle:jdk:1.7.0:update9
Configuration 3
OR
cpe:/a:oracle:jre:1.6.0:update_22
cpe:/a:oracle:jre:1.6.0:update_23
cpe:/a:oracle:jre:1.6.0:update_24
cpe:/a:oracle:jre:1.6.0:update_25
cpe:/a:oracle:jre:1.6.0:update_26
cpe:/a:oracle:jre:1.6.0:update_27
cpe:/a:oracle:jre:1.6.0:update_29
cpe:/a:oracle:jre:1.6.0:update_30
cpe:/a:oracle:jre:1.6.0:update_31
cpe:/a:oracle:jre:1.6.0:update_32
cpe:/a:oracle:jre:1.6.0:update_33
cpe:/a:oracle:jre:1.6.0:update_34
cpe:/a:oracle:jre:1.6.0:update_35
cpe:/a:oracle:jre:1.6.0:update_37
cpe:/a:oracle:jre:1.6.0:update_38
cpe:/a:sun:jre:1.6.0
cpe:/a:sun:jre:1.6.0:update_1
cpe:/a:sun:jre:1.6.0:update_10
cpe:/a:sun:jre:1.6.0:update_11
cpe:/a:sun:jre:1.6.0:update_12
cpe:/a:sun:jre:1.6.0:update_13
cpe:/a:sun:jre:1.6.0:update_14
cpe:/a:sun:jre:1.6.0:update_15
cpe:/a:sun:jre:1.6.0:update_16
cpe:/a:sun:jre:1.6.0:update_17
cpe:/a:sun:jre:1.6.0:update_18
cpe:/a:sun:jre:1.6.0:update_19
cpe:/a:sun:jre:1.6.0:update_2
cpe:/a:sun:jre:1.6.0:update_20
cpe:/a:sun:jre:1.6.0:update_21
cpe:/a:sun:jre:1.6.0:update_3
cpe:/a:sun:jre:1.6.0:update_4
cpe:/a:sun:jre:1.6.0:update_5
cpe:/a:sun:jre:1.6.0:update_6
cpe:/a:sun:jre:1.6.0:update_7
cpe:/a:sun:jre:1.6.0:update_9
Configuration 4
OR
cpe:/a:oracle:jdk:1.6.0:update_22
cpe:/a:oracle:jdk:1.6.0:update_23
cpe:/a:oracle:jdk:1.6.0:update_24
cpe:/a:oracle:jdk:1.6.0:update_25
cpe:/a:oracle:jdk:1.6.0:update_26
cpe:/a:oracle:jdk:1.6.0:update_27
cpe:/a:oracle:jdk:1.6.0:update_29
cpe:/a:oracle:jdk:1.6.0:update_30
cpe:/a:oracle:jdk:1.6.0:update_31
cpe:/a:oracle:jdk:1.6.0:update_32
cpe:/a:oracle:jdk:1.6.0:update_33
cpe:/a:oracle:jdk:1.6.0:update_34
cpe:/a:oracle:jdk:1.6.0:update_35
cpe:/a:oracle:jdk:1.6.0:update_37
cpe:/a:oracle:jdk:1.6.0:update_38
cpe:/a:sun:jdk:1.6.0
cpe:/a:sun:jdk:1.6.0:update1
cpe:/a:sun:jdk:1.6.0:update1_b06
cpe:/a:sun:jdk:1.6.0:update2
cpe:/a:sun:jdk:1.6.0:update_10
cpe:/a:sun:jdk:1.6.0:update_11
cpe:/a:sun:jdk:1.6.0:update_12
cpe:/a:sun:jdk:1.6.0:update_13
cpe:/a:sun:jdk:1.6.0:update_14
cpe:/a:sun:jdk:1.6.0:update_15
cpe:/a:sun:jdk:1.6.0:update_16
cpe:/a:sun:jdk:1.6.0:update_17
cpe:/a:sun:jdk:1.6.0:update_18
cpe:/a:sun:jdk:1.6.0:update_19
cpe:/a:sun:jdk:1.6.0:update_20
cpe:/a:sun:jdk:1.6.0:update_21
cpe:/a:sun:jdk:1.6.0:update_3
cpe:/a:sun:jdk:1.6.0:update_4
cpe:/a:sun:jdk:1.6.0:update_5
cpe:/a:sun:jdk:1.6.0:update_6
cpe:/a:sun:jdk:1.6.0:update_7
Configuration 5
OR
cpe:/a:oracle:jre:1.5.0:update_36
cpe:/a:oracle:jre:1.5.0:update_38
cpe:/a:sun:jre:1.5.0
cpe:/a:sun:jre:1.5.0:update1
cpe:/a:sun:jre:1.5.0:update10
cpe:/a:sun:jre:1.5.0:update11
cpe:/a:sun:jre:1.5.0:update12
Configuration 6
Configuration 7
Configuration 8
Showing 100 of 241 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

3 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2013-0424
NVD Published Date:
02/01/2013
NVD Last Modified:
09/18/2017