National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2013-0433 Detail

Description

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.

Source:  MITRE
Description Last Modified:  02/01/2013

Evaluator Description

Per http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html "Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)"

Impact

CVSS v2.0 Severity and Metrics:

Base Score: 5.0 MEDIUM
Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N) (V2 legend)
Impact Subscore: 2.9
Exploitability Subscore: 10.0


Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (AU): None
Confidentiality (C): None
Integrity (I): Partial
Availability (A): None
Additional Information:
Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS
http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ab011765c4e8
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html
http://marc.info/?l=bugtraq&m=136439120408139&w=2
http://marc.info/?l=bugtraq&m=136570436423916&w=2
http://marc.info/?l=bugtraq&m=136733161405818&w=2
http://rhn.redhat.com/errata/RHSA-2013-0236.html
http://rhn.redhat.com/errata/RHSA-2013-0237.html
http://rhn.redhat.com/errata/RHSA-2013-0245.html
http://rhn.redhat.com/errata/RHSA-2013-0246.html
http://rhn.redhat.com/errata/RHSA-2013-0247.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://rhn.redhat.com/errata/RHSA-2013-1456.html
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://www.kb.cert.org/vuls/id/858729 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html Vendor Advisory
http://www.securityfocus.com/bid/57719
http://www.us-cert.gov/cas/techalerts/TA13-032A.html US Government Resource
https://bugzilla.redhat.com/show_bug.cgi?id=907456
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16537
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19405
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19459
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19468
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.3

Configuration 1
OR
cpe:/a:oracle:jre:1.7.0
cpe:/a:oracle:jre:1.7.0:update1
cpe:/a:oracle:jre:1.7.0:update10
cpe:/a:oracle:jre:1.7.0:update11
cpe:/a:oracle:jre:1.7.0:update2
cpe:/a:oracle:jre:1.7.0:update3
cpe:/a:oracle:jre:1.7.0:update4
cpe:/a:oracle:jre:1.7.0:update5
cpe:/a:oracle:jre:1.7.0:update6
cpe:/a:oracle:jre:1.7.0:update7
cpe:/a:oracle:jre:1.7.0:update9
Configuration 2
OR
cpe:/a:oracle:jdk:1.7.0
cpe:/a:oracle:jdk:1.7.0:update1
cpe:/a:oracle:jdk:1.7.0:update10
cpe:/a:oracle:jdk:1.7.0:update11
cpe:/a:oracle:jdk:1.7.0:update2
cpe:/a:oracle:jdk:1.7.0:update3
cpe:/a:oracle:jdk:1.7.0:update4
cpe:/a:oracle:jdk:1.7.0:update5
cpe:/a:oracle:jdk:1.7.0:update6
cpe:/a:oracle:jdk:1.7.0:update7
cpe:/a:oracle:jdk:1.7.0:update9
Configuration 3
OR
cpe:/a:oracle:jre:1.6.0:update_22
cpe:/a:oracle:jre:1.6.0:update_23
cpe:/a:oracle:jre:1.6.0:update_24
cpe:/a:oracle:jre:1.6.0:update_25
cpe:/a:oracle:jre:1.6.0:update_26
cpe:/a:oracle:jre:1.6.0:update_27
cpe:/a:oracle:jre:1.6.0:update_29
cpe:/a:oracle:jre:1.6.0:update_30
cpe:/a:oracle:jre:1.6.0:update_31
cpe:/a:oracle:jre:1.6.0:update_32
cpe:/a:oracle:jre:1.6.0:update_33
cpe:/a:oracle:jre:1.6.0:update_34
cpe:/a:oracle:jre:1.6.0:update_35
cpe:/a:oracle:jre:1.6.0:update_37
cpe:/a:oracle:jre:1.6.0:update_38
cpe:/a:sun:jre:1.6.0
cpe:/a:sun:jre:1.6.0:update_1
cpe:/a:sun:jre:1.6.0:update_10
cpe:/a:sun:jre:1.6.0:update_11
cpe:/a:sun:jre:1.6.0:update_12
cpe:/a:sun:jre:1.6.0:update_13
cpe:/a:sun:jre:1.6.0:update_14
cpe:/a:sun:jre:1.6.0:update_15
cpe:/a:sun:jre:1.6.0:update_16
cpe:/a:sun:jre:1.6.0:update_17
cpe:/a:sun:jre:1.6.0:update_18
cpe:/a:sun:jre:1.6.0:update_19
cpe:/a:sun:jre:1.6.0:update_2
cpe:/a:sun:jre:1.6.0:update_20
cpe:/a:sun:jre:1.6.0:update_21
cpe:/a:sun:jre:1.6.0:update_3
cpe:/a:sun:jre:1.6.0:update_4
cpe:/a:sun:jre:1.6.0:update_5
cpe:/a:sun:jre:1.6.0:update_6
cpe:/a:sun:jre:1.6.0:update_7
cpe:/a:sun:jre:1.6.0:update_9
Configuration 4
OR
cpe:/a:oracle:jdk:1.6.0:update_22
cpe:/a:oracle:jdk:1.6.0:update_23
cpe:/a:oracle:jdk:1.6.0:update_24
cpe:/a:oracle:jdk:1.6.0:update_25
cpe:/a:oracle:jdk:1.6.0:update_26
cpe:/a:oracle:jdk:1.6.0:update_27
cpe:/a:oracle:jdk:1.6.0:update_29
cpe:/a:oracle:jdk:1.6.0:update_30
cpe:/a:oracle:jdk:1.6.0:update_31
cpe:/a:oracle:jdk:1.6.0:update_32
cpe:/a:oracle:jdk:1.6.0:update_33
cpe:/a:oracle:jdk:1.6.0:update_34
cpe:/a:oracle:jdk:1.6.0:update_35
cpe:/a:oracle:jdk:1.6.0:update_37
cpe:/a:oracle:jdk:1.6.0:update_38
cpe:/a:sun:jdk:1.6.0
cpe:/a:sun:jdk:1.6.0:update1
cpe:/a:sun:jdk:1.6.0:update1_b06
cpe:/a:sun:jdk:1.6.0:update2
cpe:/a:sun:jdk:1.6.0:update_10
cpe:/a:sun:jdk:1.6.0:update_11
cpe:/a:sun:jdk:1.6.0:update_12
cpe:/a:sun:jdk:1.6.0:update_13
cpe:/a:sun:jdk:1.6.0:update_14
cpe:/a:sun:jdk:1.6.0:update_15
cpe:/a:sun:jdk:1.6.0:update_16
cpe:/a:sun:jdk:1.6.0:update_17
cpe:/a:sun:jdk:1.6.0:update_18
cpe:/a:sun:jdk:1.6.0:update_19
cpe:/a:sun:jdk:1.6.0:update_20
cpe:/a:sun:jdk:1.6.0:update_21
cpe:/a:sun:jdk:1.6.0:update_3
cpe:/a:sun:jdk:1.6.0:update_4
cpe:/a:sun:jdk:1.6.0:update_5
cpe:/a:sun:jdk:1.6.0:update_6
cpe:/a:sun:jdk:1.6.0:update_7
Configuration 5
OR
cpe:/a:oracle:jre:1.5.0:update_36
cpe:/a:oracle:jre:1.5.0:update_38
cpe:/a:sun:jre:1.5.0
cpe:/a:sun:jre:1.5.0:update1
cpe:/a:sun:jre:1.5.0:update10
cpe:/a:sun:jre:1.5.0:update11
cpe:/a:sun:jre:1.5.0:update12
Configuration 6
Showing 100 of 164 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

3 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2013-0433
NVD Published Date:
02/01/2013
NVD Last Modified:
09/18/2017