Lucene search

K
cve[email protected]CVE-2013-4002
HistoryJul 23, 2013 - 11:03 a.m.

CVE-2013-4002

2013-07-2311:03:19
web.nvd.nist.gov
127
cve
2013
4002
xmlscanner.java
apache xerces2
java parser
denial of service
xml
attribute names

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

6.7 Medium

AI Score

Confidence

Low

0.019 Low

EPSS

Percentile

88.5%

XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.

Affected configurations

NVD
Node
ibmjavaMatch5.0.0.0
OR
ibmjavaMatch5.0.11.0
OR
ibmjavaMatch5.0.11.1
OR
ibmjavaMatch5.0.11.2
OR
ibmjavaMatch5.0.12.0
OR
ibmjavaMatch5.0.12.1
OR
ibmjavaMatch5.0.12.2
OR
ibmjavaMatch5.0.12.3
OR
ibmjavaMatch5.0.12.4
OR
ibmjavaMatch5.0.12.5
OR
ibmjavaMatch5.0.13.0
OR
ibmjavaMatch5.0.14.0
OR
ibmjavaMatch5.0.15.0
OR
ibmjavaMatch5.0.16.0
OR
ibmjavaMatch5.0.16.1
OR
ibmjavaMatch5.0.16.2
Node
ibmjavaMatch6.0.0.0
OR
ibmjavaMatch6.0.1.0
OR
ibmjavaMatch6.0.2.0
OR
ibmjavaMatch6.0.3.0
OR
ibmjavaMatch6.0.4.0
OR
ibmjavaMatch6.0.5.0
OR
ibmjavaMatch6.0.6.0
OR
ibmjavaMatch6.0.7.0
OR
ibmjavaMatch6.0.8.0
OR
ibmjavaMatch6.0.8.1
OR
ibmjavaMatch6.0.9.0
OR
ibmjavaMatch6.0.9.1
OR
ibmjavaMatch6.0.9.2
OR
ibmjavaMatch6.0.10.0
OR
ibmjavaMatch6.0.10.1
OR
ibmjavaMatch6.0.11.0
OR
ibmjavaMatch6.0.12.0
OR
ibmjavaMatch6.0.13.0
OR
ibmjavaMatch6.0.13.1
OR
ibmjavaMatch6.0.13.2
Node
ibmjavaMatch7.0.0.0
OR
ibmjavaMatch7.0.1.0
OR
ibmjavaMatch7.0.2.0
OR
ibmjavaMatch7.0.3.0
OR
ibmjavaMatch7.0.4.0
OR
ibmjavaMatch7.0.4.1
OR
ibmjavaMatch7.0.4.2
Node
oraclejdkMatch1.5.0update51
OR
oraclejdkMatch1.6.0update60
OR
oraclejdkMatch1.7.0update40
OR
oraclejreMatch1.5.0update51
OR
oraclejreMatch1.6.0update60
OR
oraclejreMatch1.7.0update40
OR
oraclejrockitRanger27.7.0r27.7.6
OR
oraclejrockitRanger28.0.0r28.2.8
Node
ibmsterling_b2b_integratorMatch5.2.4
Node
ibmhost_on-demandMatch11.0
OR
ibmhost_on-demandMatch11.0.1
OR
ibmhost_on-demandMatch11.0.2
OR
ibmhost_on-demandMatch11.0.3
OR
ibmhost_on-demandMatch11.0.4
OR
ibmhost_on-demandMatch11.0.5
OR
ibmhost_on-demandMatch11.0.5.1
OR
ibmhost_on-demandMatch11.0.6
OR
ibmhost_on-demandMatch11.0.6.1
OR
ibmhost_on-demandMatch11.0.7
OR
ibmhost_on-demandMatch11.0.8
AND
microsoftwindowsMatch-
Node
ibmtivoli_application_dependency_discovery_managerMatch7.2.2
AND
ibmaixMatch-
OR
linuxlinux_kernelMatch-
OR
microsoftwindowsMatch-
OR
oraclesolarisMatch--
Node
ibmsterling_b2b_integratorMatch5.1
OR
ibmsterling_b2b_integratorMatch5.2
OR
ibmsterling_file_gatewayMatch2.1
OR
ibmsterling_file_gatewayMatch2.2
AND
hphp-uxMatch-
OR
ibmaixMatch-
OR
ibmiMatch-
OR
linuxlinux_kernelMatch-
OR
microsoftwindowsMatch-
OR
oraclesolarisMatch--
Node
opensuseopensuseMatch12.2
OR
opensuseopensuseMatch12.3
OR
suselinux_enterprise_desktopMatch10sp4-
OR
suselinux_enterprise_desktopMatch11sp3
OR
suselinux_enterprise_javaMatch10sp4
OR
suselinux_enterprise_javaMatch11sp2
OR
suselinux_enterprise_javaMatch11sp3
OR
suselinux_enterprise_sdkMatch11sp2
OR
suselinux_enterprise_sdkMatch11sp3
OR
suselinux_enterprise_serverMatch9
OR
suselinux_enterprise_serverMatch10sp3ltss
OR
suselinux_enterprise_serverMatch10sp4-
OR
suselinux_enterprise_serverMatch11sp2-
OR
suselinux_enterprise_serverMatch11sp2vmware
OR
suselinux_enterprise_serverMatch11sp3-
OR
suselinux_enterprise_serverMatch11sp3vmware
Node
canonicalubuntu_linuxMatch10.04-
OR
canonicalubuntu_linuxMatch12.04-
OR
canonicalubuntu_linuxMatch12.10
OR
canonicalubuntu_linuxMatch13.04
OR
canonicalubuntu_linuxMatch13.10
Node
apachexerces2_javaRange2.4.02.12.0

References

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

6.7 Medium

AI Score

Confidence

Low

0.019 Low

EPSS

Percentile

88.5%