|
|
|
Oracle Java Multiple Flaws Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges
|
SecurityTracker Alert ID: 1028434 |
SecurityTracker URL: http://securitytracker.com/id/1028434
|
CVE Reference:
CVE-2013-0401, CVE-2013-0402, CVE-2013-1488, CVE-2013-1491, CVE-2013-1518, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1561, CVE-2013-1563, CVE-2013-1564, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2414, CVE-2013-2415, CVE-2013-2416, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2425, CVE-2013-2426, CVE-2013-2427, CVE-2013-2428, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431, CVE-2013-2432, CVE-2013-2433, CVE-2013-2434, CVE-2013-2435, CVE-2013-2436, CVE-2013-2438, CVE-2013-2439, CVE-2013-2440
(Links to External Site)
|
Date: Apr 16 2013
|
Impact:
Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via local system, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 5.0 Update 41, 6 Update 43, 7 Update 17; and prior versions
|
Description:
Multiple vulnerabilities were reported in Oracle Java. A remote user can cause arbitrary code to be executed on the target user's system. A local user can obtain elevated privileges on the target system. A remote user can access and modify data. A remote or local user can cause denial of service conditions.
A remote user can create a specially crafted Java applet or Java Web Start application that, when loaded by the target user, will execute arbitrary code on the target system.
The 2D [CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-1569, CVE-2013-2434, CVE-2013-2432, CVE-2013-2420, CVE-2013-1491], Beans [CVE-2013-1558], Deployment [CVE-2013-2440, CVE-2013-2435], Hotspot [CVE-2013-2421, CVE-2013-2431], Install [CVE-2013-2425, CVE-2013-1563], JAXP [CVE-2013-1518], JavaFX [CVE-2013-0402, CVE-2013-2414, CVE-2013-2428, CVE-2013-2427], Libraries [CVE-2013-1488, CVE-2013-2422, CVE-2013-2426, CVE-2013-2436], RMI [CVE-2013-1537, CVE-2013-1557], and ImageIO [CVE-2013-2429, CVE-2013-2430] components are affected.
The RMI vulnerability CVE-2013-1537 also affects Java server deployments.
A local user can execute arbitrary code on the target system with elevated privileges [CVE-2013-2439].
A remote user can exploit a flaw in the AWT component to partially access and modify data [CVE-2013-0401].
A remote user can exploit a flaw in the 2D component to cause denial of service conditions [CVE-2013-2419]
A remote user can partially access data. The JMX [CVE-2013-2424] and JavaFX [CVE-2013-1561] components are affected.
A remote user can partially modify data. The JavaFX [CVE-2013-1564, CVE-2013-2438] and Deployment [CVE-2013-2416, CVE-2013-2433, CVE-2013-1540], and Hotspot [CVE-2013-2423] components are affected.
A remote user can exploit a flaw in the Networking component to partially deny service [CVE-2013-2417].
A local user can exploit a flaw in the Deployment component to partially access and modify data and partially deny service [CVE-2013-2418].
A local user can exploit a flaw in JAX-WS to partially access data [CVE-2013-2415]. Java server deployments are also affected.
The following researchers reported these vulnerabilities:
Adam Gowdiak of Security Explorations; Alexander Antukh of SEC Consult; Alin Rad Pop (binaryproof) via HP's Zero Day Initiative; an Anonymous researcher via Beyond Security's SecuriTeam Secure Disclosure Program; Ben Murphy via HP's ZDI; Ben Murphy with Aware Mobile via HP's Zero Day Initiative; Chris Ries via iDefense; Hontvari Attila; James Forshaw (tyranid) via HP's Zero Day Initiative; Jeroen Frijters; Joshua J. Drake with Accuvant LABS via HP's Zero Day Initiative; Vitaliy Toropov via HP's Zero Day Initiative; Vitaliy Toropov via iDefense; and VUPEN Security via HP's Zero Day Initiative.
|
Impact:
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
A local user can obtain elevated privileges on the target system.
A remote user can access and modify data.
A remote or local user can cause denial of service conditions.
|
Solution:
The vendor has issued a fix (6 Update 45, 7 Update 21).
The vendor's advisory is available at:
http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html
|
Vendor URL: www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html (Links to External Site)
|
Cause:
Not specified
|
Underlying OS: Linux (Any), UNIX (Solaris - SunOS), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|
Go to the Top of This SecurityTracker Archive Page
|