CVE-2013-0401

critical

Description

The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.

References

https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130

https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124

https://twitter.com/thezdi/status/309784608508100608

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19641

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19463

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16297

https://bugzilla.redhat.com/show_bug.cgi?id=920245

http://www.zdnet.com/pwn2own-down-go-all-the-browsers-7000012283/

http://www.us-cert.gov/ncas/alerts/TA13-107A

http://www.ubuntu.com/usn/USN-1806-1

http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html

http://www.mandriva.com/security/advisories?name=MDVSA-2013:161

http://www.mandriva.com/security/advisories?name=MDVSA-2013:145

http://security.gentoo.org/glsa/glsa-201406-32.xml

http://rhn.redhat.com/errata/RHSA-2013-1456.html

http://rhn.redhat.com/errata/RHSA-2013-1455.html

http://rhn.redhat.com/errata/RHSA-2013-0758.html

http://rhn.redhat.com/errata/RHSA-2013-0757.html

http://rhn.redhat.com/errata/RHSA-2013-0752.html

http://marc.info/?l=bugtraq&m=137283787217316&w=2

http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html

http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html

http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html

http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html

http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/31c782610044

http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880

http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/

http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/

Details

Source: Mitre, NVD

Published: 2013-03-08

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical