Language:
https://access.redhat.com/errata/RHSA-2013:1014
https://access.redhat.com/security/cve/cve-2013-2465
https://access.redhat.com/security/cve/cve-2013-1571
https://access.redhat.com/security/cve/cve-2013-2472
https://access.redhat.com/security/cve/cve-2013-2412
https://access.redhat.com/security/cve/cve-2013-2455
https://access.redhat.com/security/cve/cve-2013-2456
https://access.redhat.com/security/cve/cve-2013-2457
https://access.redhat.com/security/cve/cve-2013-2450
https://access.redhat.com/security/cve/cve-2013-2452
https://access.redhat.com/security/cve/cve-2013-2453
https://access.redhat.com/security/cve/cve-2013-2459
https://access.redhat.com/security/cve/cve-2013-2470
https://access.redhat.com/security/cve/cve-2013-2471
https://access.redhat.com/security/cve/cve-2013-2473
https://access.redhat.com/security/cve/cve-2013-2447
https://access.redhat.com/security/cve/cve-2013-2446
https://access.redhat.com/security/cve/cve-2013-2463
https://access.redhat.com/security/cve/cve-2013-2407
https://access.redhat.com/security/cve/cve-2013-1500
https://access.redhat.com/security/cve/cve-2013-2448
https://access.redhat.com/security/cve/cve-2013-2469
https://access.redhat.com/security/cve/cve-2013-2443
https://access.redhat.com/security/cve/cve-2013-2461
Severity: Critical
ID: 67184
File Name: redhat-RHSA-2013-1014.nasl
Version: 1.33
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 7/5/2013
Updated: 3/29/2022
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2013-2473
CPE: cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-debuginfo, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.4, cpe:/o:redhat:enterprise_linux:5.9, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-javadoc, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-devel, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-demo, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-src
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/3/2013
Vulnerability Publication Date: 6/18/2013
CISA Known Exploited Vulnerability Due Dates: 4/18/2022
Core Impact
Metasploit (Java storeImageArray() Invalid Array Indexing Vulnerability)
CVE: CVE-2013-1500, CVE-2013-1571, CVE-2013-2407, CVE-2013-2412, CVE-2013-2443, CVE-2013-2444, CVE-2013-2445, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2452, CVE-2013-2453, CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2459, CVE-2013-2461, CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473
BID: 60617, 60618, 60619, 60620, 60623, 60627, 60629, 60632, 60633, 60634, 60638, 60639, 60640, 60641, 60644, 60645, 60646, 60647, 60651, 60653, 60655, 60656, 60657, 60658, 60659
RHSA: 2013:1014