CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
92.9%
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect “access control checks” in the logging API that allow remote attackers to bypass Java sandbox restrictions.
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:* |
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907346
icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS
icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce105dd2e4de
lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html
lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html
lists.opensuse.org/opensuse-security-announce/2013-03/msg00034.html
marc.info/?l=bugtraq&m=136439120408139&w=2
marc.info/?l=bugtraq&m=136570436423916&w=2
marc.info/?l=bugtraq&m=136733161405818&w=2
rhn.redhat.com/errata/RHSA-2013-0236.html
rhn.redhat.com/errata/RHSA-2013-0237.html
rhn.redhat.com/errata/RHSA-2013-0245.html
rhn.redhat.com/errata/RHSA-2013-0246.html
rhn.redhat.com/errata/RHSA-2013-0247.html
rhn.redhat.com/errata/RHSA-2013-1455.html
rhn.redhat.com/errata/RHSA-2013-1456.html
security.gentoo.org/glsa/glsa-201406-32.xml
www.kb.cert.org/vuls/id/858729
www.mandriva.com/security/advisories?name=MDVSA-2013:095
www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
www.securityfocus.com/bid/57711
www.us-cert.gov/cas/techalerts/TA13-032A.html
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15888
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19261
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19471
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19484
wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056