CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
98.8%
Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | jdk | * | cpe:2.3:a:oracle:jdk:*:update45:*:*:*:*:*:* |
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:* |
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:* |
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:* |
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:* |
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:* |
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:* |
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:* |
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:* |
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:* |
advisories.mageia.org/MGASA-2013-0185.html
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
hg.openjdk.java.net/jdk7u/jdk7u-dev/langtools/rev/17ee569d0c01
lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
marc.info/?l=bugtraq&m=137545505800971&w=2
marc.info/?l=bugtraq&m=137545592101387&w=2
rhn.redhat.com/errata/RHSA-2013-0963.html
rhn.redhat.com/errata/RHSA-2013-1059.html
rhn.redhat.com/errata/RHSA-2013-1060.html
rhn.redhat.com/errata/RHSA-2013-1081.html
rhn.redhat.com/errata/RHSA-2013-1455.html
rhn.redhat.com/errata/RHSA-2013-1456.html
secunia.com/advisories/54154
security.gentoo.org/glsa/glsa-201406-32.xml
www-01.ibm.com/support/docview.wss?uid=swg21642336
www-01.ibm.com/support/docview.wss?uid=swg21644197
www.kb.cert.org/vuls/id/225657
www.mandriva.com/security/advisories?name=MDVSA-2013:183
www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
www.securityfocus.com/bid/60634
www.us-cert.gov/ncas/alerts/TA13-169A
access.redhat.com/errata/RHSA-2014:0414
bugzilla.redhat.com/show_bug.cgi?id=973474
lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/re0504f08000df786e51795940501e81a5d0ae981ecca68141e87ece0%40%3Ccommits.openoffice.apache.org%3E
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17215
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19518
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19667
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19718