CVE-2013-1493

The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
References
Link Resource
http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html
http://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04117626-1
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-March/022145.html
http://marc.info/?l=bugtraq&m=136439120408139&w=2
http://marc.info/?l=bugtraq&m=136439120408139&w=2
http://marc.info/?l=bugtraq&m=136570436423916&w=2
http://marc.info/?l=bugtraq&m=136570436423916&w=2
http://rhn.redhat.com/errata/RHSA-2013-0601.html
http://rhn.redhat.com/errata/RHSA-2013-0603.html
http://rhn.redhat.com/errata/RHSA-2013-0604.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://rhn.redhat.com/errata/RHSA-2013-1456.html
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://www.exploit-db.com/exploits/24904
http://www.kb.cert.org/vuls/id/688246 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
http://www.oracle.com/ocom/groups/public/%40otn/documents/webcontent/1915099.xml
http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html
http://www.securityfocus.com/bid/58238
http://www.securitytracker.com/id/1029803
http://www.symantec.com/connect/blogs/latest-java-zero-day-shares-connections-bit9-security-incident
http://www.ubuntu.com/usn/USN-1755-2
http://www.us-cert.gov/ncas/alerts/TA13-064A US Government Resource
https://bugzilla.redhat.com/show_bug.cgi?id=917553
https://krebsonsecurity.com/2013/03/new-java-0-day-attack-echoes-bit9-breach/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19246
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19477
https://twitter.com/jduck1337/status/307629902574800897
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0088
http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html
http://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04117626-1
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-March/022145.html
http://marc.info/?l=bugtraq&m=136439120408139&w=2
http://marc.info/?l=bugtraq&m=136439120408139&w=2
http://marc.info/?l=bugtraq&m=136570436423916&w=2
http://marc.info/?l=bugtraq&m=136570436423916&w=2
http://rhn.redhat.com/errata/RHSA-2013-0601.html
http://rhn.redhat.com/errata/RHSA-2013-0603.html
http://rhn.redhat.com/errata/RHSA-2013-0604.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://rhn.redhat.com/errata/RHSA-2013-1456.html
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://www.exploit-db.com/exploits/24904
http://www.kb.cert.org/vuls/id/688246 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
http://www.oracle.com/ocom/groups/public/%40otn/documents/webcontent/1915099.xml
http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html
http://www.securityfocus.com/bid/58238
http://www.securitytracker.com/id/1029803
http://www.symantec.com/connect/blogs/latest-java-zero-day-shares-connections-bit9-security-incident
http://www.ubuntu.com/usn/USN-1755-2
http://www.us-cert.gov/ncas/alerts/TA13-064A US Government Resource
https://bugzilla.redhat.com/show_bug.cgi?id=917553
https://krebsonsecurity.com/2013/03/new-java-0-day-attack-echoes-bit9-breach/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19246
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19477
https://twitter.com/jduck1337/status/307629902574800897
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0088
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:jre:*:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:jdk:*:update41:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:jre:*:update41:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:oracle:jdk:*:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*

History

21 Nov 2024, 01:49

Type Values Removed Values Added
References () http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html - () http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html -
References () http://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04117626-1 - () http://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04117626-1 -
References () http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html - () http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html - () http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html - () http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html - () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html -
References () http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-March/022145.html - () http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-March/022145.html -
References () http://marc.info/?l=bugtraq&m=136439120408139&w=2 - () http://marc.info/?l=bugtraq&m=136439120408139&w=2 -
References () http://marc.info/?l=bugtraq&m=136570436423916&w=2 - () http://marc.info/?l=bugtraq&m=136570436423916&w=2 -
References () http://rhn.redhat.com/errata/RHSA-2013-0601.html - () http://rhn.redhat.com/errata/RHSA-2013-0601.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0603.html - () http://rhn.redhat.com/errata/RHSA-2013-0603.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0604.html - () http://rhn.redhat.com/errata/RHSA-2013-0604.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1455.html - () http://rhn.redhat.com/errata/RHSA-2013-1455.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1456.html - () http://rhn.redhat.com/errata/RHSA-2013-1456.html -
References () http://security.gentoo.org/glsa/glsa-201406-32.xml - () http://security.gentoo.org/glsa/glsa-201406-32.xml -
References () http://www.exploit-db.com/exploits/24904 - () http://www.exploit-db.com/exploits/24904 -
References () http://www.kb.cert.org/vuls/id/688246 - US Government Resource () http://www.kb.cert.org/vuls/id/688246 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:095 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:095 -
References () http://www.oracle.com/ocom/groups/public/%40otn/documents/webcontent/1915099.xml - () http://www.oracle.com/ocom/groups/public/%40otn/documents/webcontent/1915099.xml -
References () http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html - () http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html -
References () http://www.securityfocus.com/bid/58238 - () http://www.securityfocus.com/bid/58238 -
References () http://www.securitytracker.com/id/1029803 - () http://www.securitytracker.com/id/1029803 -
References () http://www.symantec.com/connect/blogs/latest-java-zero-day-shares-connections-bit9-security-incident - () http://www.symantec.com/connect/blogs/latest-java-zero-day-shares-connections-bit9-security-incident -
References () http://www.ubuntu.com/usn/USN-1755-2 - () http://www.ubuntu.com/usn/USN-1755-2 -
References () http://www.us-cert.gov/ncas/alerts/TA13-064A - US Government Resource () http://www.us-cert.gov/ncas/alerts/TA13-064A - US Government Resource
References () https://bugzilla.redhat.com/show_bug.cgi?id=917553 - () https://bugzilla.redhat.com/show_bug.cgi?id=917553 -
References () https://krebsonsecurity.com/2013/03/new-java-0-day-attack-echoes-bit9-breach/ - () https://krebsonsecurity.com/2013/03/new-java-0-day-attack-echoes-bit9-breach/ -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19246 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19246 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19477 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19477 -
References () https://twitter.com/jduck1337/status/307629902574800897 - () https://twitter.com/jduck1337/status/307629902574800897 -
References () https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0088 - () https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0088 -

07 Nov 2023, 02:14

Type Values Removed Values Added
References
  • {'url': 'http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1915099.xml', 'name': 'http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1915099.xml', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () http://www.oracle.com/ocom/groups/public/%40otn/documents/webcontent/1915099.xml -

Information

Published : 2013-03-05 22:06

Updated : 2024-11-21 01:49


NVD link : CVE-2013-1493

Mitre link : CVE-2013-1493

CVE.ORG link : CVE-2013-1493


JSON object : View

Products Affected

oracle

  • jdk
  • jre

sun

  • jre
  • jdk
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer