(Apple Issues Fix) Oracle Java Flaws Let Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1028160 |
SecurityTracker URL: http://securitytracker.com/id/1028160
|
CVE Reference:
CVE-2013-1486, CVE-2013-1487
(Links to External Site)
|
Date: Feb 19 2013
|
Impact:
Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 1.4.2_41 and prior, 5.0 Update 39 and prior, 6 Update 39, 7 Update 13 and prior
|
Description:
Several vulnerabilities were reported in Oracle Java. A remote user can cause arbitrary code to be executed on the target system. A remote user can partially modify data on the target system.
A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.
The Libraries [CVE-2013-1484], JMX [CVE-2013-1486], and Deployment [CVE-2013-1487] components are affected.
A remote user can partially modify data on the target system [CVE-2013-1485]. The Libraries component is affected.
The following researchers reported these vulnerabilities:
Ben Murphy via TippingPoint; Kenny Paterson of Royal Holloway, University of London; Michael Schierl; Nadhem AlFardan of Royal Holloway, University of London; and Tomasko Labuda via the iSIGHT Partners GVP Program.
|
Impact:
A remote user can create Java content that, when loaded by the target user, will execute arbitrary code on the target user's system.
A remote user can partially modify data on the target system.
|
Solution:
Apple has issued a fix for CVE-2013-1486 and CVE-2013-1487.
The Apple advisory will be available at:
http://support.apple.com/kb/HT1222
|
Vendor URL: www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html (Links to External Site)
|
Cause:
Not specified
|
Underlying OS: UNIX (macOS/OS X)
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|