National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2013-5783 Detail

Description

Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Swing.

Source:  MITRE      Last Modified:  10/16/2013

Evaluator Description

Per: http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.

Quick Info

CVE Dictionary Entry:
CVE-2013-5783
Original release date:
10/16/2013
Last revised:
01/04/2018
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
6.4 MEDIUM
Vector:
(AV:N/AC:L/Au:N/C:P/I:P/A:N) (legend)
Impact Subscore:
4.9
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1019137 External Source CONFIRM http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1019137
http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html External Source APPLE APPLE-SA-2013-10-15-1
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html External Source SUSE SUSE-SU-2013:1666
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html External Source SUSE SUSE-SU-2013:1677
http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html External Source SUSE openSUSE-SU-2013:1663
http://marc.info/?l=bugtraq&m=138674031212883&w=2 External Source HP HPSBUX02943
http://marc.info/?l=bugtraq&m=138674073720143&w=2 External Source HP HPSBUX02944
http://rhn.redhat.com/errata/RHSA-2013-1440.html External Source REDHAT RHSA-2013:1440
http://rhn.redhat.com/errata/RHSA-2013-1447.html External Source REDHAT RHSA-2013:1447
http://rhn.redhat.com/errata/RHSA-2013-1451.html External Source REDHAT RHSA-2013:1451
http://rhn.redhat.com/errata/RHSA-2013-1505.html External Source REDHAT RHSA-2013:1505
http://rhn.redhat.com/errata/RHSA-2013-1507.html External Source REDHAT RHSA-2013:1507
http://rhn.redhat.com/errata/RHSA-2013-1508.html External Source REDHAT RHSA-2013:1508
http://rhn.redhat.com/errata/RHSA-2013-1509.html External Source REDHAT RHSA-2013:1509
http://rhn.redhat.com/errata/RHSA-2013-1793.html External Source REDHAT RHSA-2013:1793
http://security.gentoo.org/glsa/glsa-201406-32.xml External Source GENTOO GLSA-201406-32
http://support.apple.com/kb/HT5982 External Source CONFIRM http://support.apple.com/kb/HT5982
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html External Source CONFIRM http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html
http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html Patch; Vendor Advisory External Source CONFIRM http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
http://www.securityfocus.com/bid/63154 External Source BID 63154
http://www.ubuntu.com/usn/USN-2033-1 External Source UBUNTU USN-2033-1
http://www.ubuntu.com/usn/USN-2089-1 External Source UBUNTU USN-2089-1
http://www-01.ibm.com/support/docview.wss?uid=swg21655201 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21655201
https://access.redhat.com/errata/RHSA-2014:0414 External Source REDHAT RHSA-2014:0414
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19088 External Source OVAL oval:org.mitre.oval:def:19088

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_35:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_37:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_38:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_39:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_41:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_43:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_45:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update_51:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:update_60:*:*:*:*:*:*    versions up to (including) 1.6.0
cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
Configuration 2
OR
cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:update_40:*:*:*:*:*:*    versions up to (including) 1.7.0
Configuration 3
OR
cpe:2.3:a:oracle:jdk:1.5.0:update_36:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update_38:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update_40:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update_41:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update_45:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:*:update_51:*:*:*:*:*:*    versions up to (including) 1.5.0
cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
Configuration 4
OR
cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
Configuration 5
Configuration 6
Showing 100 of 196 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 5 change records found - show changes