CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
93.5%
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via “certain value handler constructors.”
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:* |
oracle | jre | 1.7.0 | cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:* |
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907457
icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS
icedtea.classpath.org/hg/release/icedtea7-forest-2.3/corba/rev/5116fe321210
lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html
lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html
lists.opensuse.org/opensuse-security-announce/2013-03/msg00034.html
marc.info/?l=bugtraq&m=136439120408139&w=2
marc.info/?l=bugtraq&m=136570436423916&w=2
marc.info/?l=bugtraq&m=136733161405818&w=2
rhn.redhat.com/errata/RHSA-2013-0236.html
rhn.redhat.com/errata/RHSA-2013-0237.html
rhn.redhat.com/errata/RHSA-2013-0245.html
rhn.redhat.com/errata/RHSA-2013-0246.html
rhn.redhat.com/errata/RHSA-2013-0247.html
rhn.redhat.com/errata/RHSA-2013-1455.html
rhn.redhat.com/errata/RHSA-2013-1456.html
security.gentoo.org/glsa/glsa-201406-32.xml
www.kb.cert.org/vuls/id/858729
www.mandriva.com/security/advisories?name=MDVSA-2013:095
www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
www.securityfocus.com/bid/57696
www.us-cert.gov/cas/techalerts/TA13-032A.html
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16652
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19466
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19475
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19507
wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056