SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java SE Vendors:   Oracle, Sun
(Apple Issues Fix) Oracle Java Multiple Flaws Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1028439
SecurityTracker URL:  http://securitytracker.com/id/1028439
CVE Reference:   CVE-2013-1491, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1563, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2417, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424, CVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2435, CVE-2013-2440   (Links to External Site)
Date:  Apr 17 2013
Impact:   Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.0 Update 41, 6 Update 43, 7 Update 17; and prior versions
Description:   Multiple vulnerabilities were reported in Oracle Java. A remote user can cause arbitrary code to be executed on the target user's system. A local user can obtain elevated privileges on the target system. A remote user can access and modify data. A remote or local user can cause denial of service conditions.

A remote user can create a specially crafted Java applet or Java Web Start application that, when loaded by the target user, will execute arbitrary code on the target system.

The 2D [CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-1569, CVE-2013-2434, CVE-2013-2432, CVE-2013-2420, CVE-2013-1491], Beans [CVE-2013-1558], Deployment [CVE-2013-2440, CVE-2013-2435], Hotspot [CVE-2013-2421, CVE-2013-2431], Install [CVE-2013-2425, CVE-2013-1563], JAXP [CVE-2013-1518], JavaFX [CVE-2013-0402, CVE-2013-2414, CVE-2013-2428, CVE-2013-2427], Libraries [CVE-2013-1488, CVE-2013-2422, CVE-2013-2426, CVE-2013-2436], RMI [CVE-2013-1537, CVE-2013-1557], and ImageIO [CVE-2013-2429, CVE-2013-2430] components are affected.

The RMI vulnerability CVE-2013-1537 also affects Java server deployments.

A local user can execute arbitrary code on the target system with elevated privileges [CVE-2013-2439].

A remote user can exploit a flaw in the AWT component to partially access and modify data [CVE-2013-0401].

A remote user can exploit a flaw in the 2D component to cause denial of service conditions [CVE-2013-2419]

A remote user can partially access data. The JMX [CVE-2013-2424] and JavaFX [CVE-2013-1561] components are affected.

A remote user can partially modify data. The JavaFX [CVE-2013-1564, CVE-2013-2438] and Deployment [CVE-2013-2416, CVE-2013-2433, CVE-2013-1540], and Hotspot [CVE-2013-2423] components are affected.

A remote user can exploit a flaw in the Networking component to partially deny service [CVE-2013-2417].

A local user can exploit a flaw in the Deployment component to partially access and modify data and partially deny service [CVE-2013-2418].

A local user can exploit a flaw in JAX-WS to partially access data [CVE-2013-2415]. Java server deployments are also affected.

The following researchers reported these vulnerabilities:

Adam Gowdiak of Security Explorations; Alexander Antukh of SEC Consult; Alin Rad Pop (binaryproof) via HP's Zero Day Initiative; an Anonymous researcher via Beyond Security's SecuriTeam Secure Disclosure Program; Ben Murphy via HP's ZDI; Ben Murphy with Aware Mobile via HP's Zero Day Initiative; Chris Ries via iDefense; Hontvari Attila; James Forshaw (tyranid) via HP's Zero Day Initiative; Jeroen Frijters; Joshua J. Drake with Accuvant LABS via HP's Zero Day Initiative; Vitaliy Toropov via HP's Zero Day Initiative; Vitaliy Toropov via iDefense; and VUPEN Security via HP's Zero Day Initiative.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A local user can obtain elevated privileges on the target system.

A remote user can access and modify data.

A remote or local user can cause denial of service conditions.

Solution:   Apple has issued a fix for CVE-2013-1491, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1563, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2417, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424, CVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2435, and CVE-2013-2440 for OS X.

The Apple advisory is available at:

http://support.apple.com/kb/HT5734

Vendor URL:  www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html (Links to External Site)
Cause:   Not specified
Underlying OS:  UNIX (macOS/OS X)

Message History:   This archive entry is a follow-up to the message listed below.
Apr 16 2013 Oracle Java Multiple Flaws Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges



 Source Message Contents

Subject:  APPLE-SA-2013-04-16-2 Java for OS X 2013-003 and Mac OS X v10.6 Update 15

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2013-04-16-2 Java for OS X 2013-003 and
Mac OS X v10.6 Update 15

Java for OS X 2013-003 and Mac OS X v10.6 Update 15 are now available
and address the following:

Java
Available for:  Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7 or later, OS X Lion Server v10.7 or later,
OS X Mountain Lion 10.8 or later
Impact:  Multiple vulnerabilities in Java 1.6.0_43
Description:  Multiple vulnerabilities existed in Java 1.6.0_43, the
most serious of which may allow an untrusted Java applet to execute
arbitrary code outside the Java sandbox. Visiting a web page
containing a maliciously crafted untrusted Java applet may lead to
arbitrary code execution with the privileges of the current user.
These issues were addressed by updating to Java version 1.6.0_45.
Further information is available via the Java website at http://www.o
racle.com/technetwork/java/javase/releasenotes-136954.html
CVE-ID
CVE-2013-1491
CVE-2013-1537
CVE-2013-1540
CVE-2013-1557
CVE-2013-1558
CVE-2013-1563
CVE-2013-1569
CVE-2013-2383
CVE-2013-2384
CVE-2013-2394
CVE-2013-2417
CVE-2013-2419
CVE-2013-2420
CVE-2013-2422
CVE-2013-2424
CVE-2013-2429
CVE-2013-2430
CVE-2013-2432
CVE-2013-2435
CVE-2013-2437
CVE-2013-2440


Java for OS X 2013-003 and Mac OS X v10.6 Update 15
may be obtained from the Software Update pane in System Preferences,
Mac App Store, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

For Mac OS X v10.6 systems
The download file is named: JavaForMacOSX10.6.Update15.dmg
Its SHA-1 digest is: 56a950f7a89f2a1c39de01b2b1998986f132be57

For OS X Lion and Mountain Lion systems
The download file is named: JavaForOSX2013-003.dmg
Its SHA-1 digest is: 3393ff8642b6e29cacaf10fbb04f76e657cc313a

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/


-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=bvDt
-----END PGP SIGNATURE-----
 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC