Overview
Oracle Java 7 Update 15, Java 6 Update 41, Java 5.0 Update 40, and earlier versions contain a vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
The Oracle Java Runtime Environment (JRE) allows users to run Java applications in a browser or as standalone programs. Oracle has made the JRE available for multiple operating systems. OpenJDK is an open-source implementation of the Java platform, and the IcedTea project aims to make it easier to deploy OpenJDK, including a web browser plugin. Additional details of the vulnerability can be found at FireEye Malware Intelligence Lab blog post. |
Impact
By convincing a user to visit a specially crafted HTML document, a remote attacker may be able to execute arbitrary code on a vulnerable system. Note that applications that use the Internet Explorer web content rendering components, such as Microsoft Office or Windows Desktop Search, may also be used as an attack vector for these vulnerabilities. |
Solution
Apply an update |
Disable Java in web browsers |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 8.7 | E:H/RL:OF/RC:C |
Environmental | 9.4 | CDP:H/TD:H/CR:ND/IR:ND/AR:ND |
References
- http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html
- http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html#more
- https://blogs.oracle.com/security/entry/security_alert_cve_2013_1493
- http://www.oracle.com/technetwork/java/javase/7u-relnotes-515228.html
- http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-March/022145.html
- http://blogs.technet.com/b/srd/archive/2013/05/29/java-when-you-cannot-let-go.aspx
Acknowledgements
Oracle credits the following people or organizations for reporting security vulnerabilities addressed by this Security Alert to Oracle: an Anonymous Reporter of TippingPoint's Zero Day Initiative; axtaxt viaTipping Point's Zero Day Initiative; Darien Kindlund of FireEye; Vitaliy Toropov via iDefense; and Vitaliy Toropov via TippingPoint.
This document was written by Michael Orlando.
Other Information
CVE IDs: | CVE-2013-1493, CVE-2013-0809 |
Date Public: | 2013-03-04 |
Date First Published: | 2013-03-05 |
Date Last Updated: | 2013-06-14 17:54 UTC |
Document Revision: | 24 |