National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2013-5907 Detail

Description

Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.

Source:  MITRE      Last Modified:  01/15/2014

Evaluator Description

Per: http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html "Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service."

Quick Info

CVE Dictionary Entry:
CVE-2013-5907
Original release date:
01/15/2014
Last revised:
01/04/2018
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
10.0 HIGH
Vector:
(AV:N/AC:L/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/9d29c19f1de1 External Source MISC http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/9d29c19f1de1
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html External Source SUSE SUSE-SU-2014:0246
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html External Source SUSE SUSE-SU-2014:0266
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html External Source SUSE SUSE-SU-2014:0451
http://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html External Source SUSE openSUSE-SU-2014:0174
http://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html External Source SUSE openSUSE-SU-2014:0177
http://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html External Source SUSE openSUSE-SU-2014:0180
http://marc.info/?l=bugtraq&m=139402697611681&w=2 External Source HP HPSBUX02972
http://marc.info/?l=bugtraq&m=139402749111889&w=2 External Source HP HPSBUX02973
http://rhn.redhat.com/errata/RHSA-2014-0026.html External Source REDHAT RHSA-2014:0026
http://rhn.redhat.com/errata/RHSA-2014-0027.html External Source REDHAT RHSA-2014:0027
http://rhn.redhat.com/errata/RHSA-2014-0030.html External Source REDHAT RHSA-2014:0030
http://rhn.redhat.com/errata/RHSA-2014-0097.html External Source REDHAT RHSA-2014:0097
http://rhn.redhat.com/errata/RHSA-2014-0134.html External Source REDHAT RHSA-2014:0134
http://rhn.redhat.com/errata/RHSA-2014-0135.html External Source REDHAT RHSA-2014:0135
http://rhn.redhat.com/errata/RHSA-2014-0136.html External Source REDHAT RHSA-2014:0136
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html Vendor Advisory External Source CONFIRM http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
http://www.securityfocus.com/bid/64758 External Source BID 64758
http://www.securityfocus.com/bid/64894 External Source BID 64894
http://www.securitytracker.com/id/1029608 External Source SECTRACK 1029608
http://www.ubuntu.com/usn/USN-2089-1 External Source UBUNTU USN-2089-1
http://www.ubuntu.com/usn/USN-2124-1 External Source UBUNTU USN-2124-1
https://access.redhat.com/errata/RHSA-2014:0414 External Source REDHAT RHSA-2014:0414
https://bugzilla.redhat.com/show_bug.cgi?id=1052915 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1052915
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 External Source CONFIRM https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777

Technical Details

Vulnerability Type (View All)

Change History 3 change records found - show changes