Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2013-0401
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 10/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157
- https://twitter.com/thezdi/status/309784608508100608
- http://www.zdnet.com/pwn2own-down-go-all-the-browsers-7000012283/
- http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html
- http://www.ubuntu.com/usn/USN-1806-1
- http://rhn.redhat.com/errata/RHSA-2013-0752.html
- http://rhn.redhat.com/errata/RHSA-2013-0758.html
- http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjd
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html
- http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-relea
- http://rhn.redhat.com/errata/RHSA-2013-0757.html
- http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html
- http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/31c782610044
- https://bugzilla.redhat.com/show_bug.cgi?id=920245
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html
- http://marc.info/?l=bugtraq&m=137283787217316&w=2
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
- http://www.us-cert.gov/ncas/alerts/TA13-107A
- http://rhn.redhat.com/errata/RHSA-2013-1455.html
- http://rhn.redhat.com/errata/RHSA-2013-1456.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:145
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:161
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124
- http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1