CVE-2013-4578

jarsigner in OpenJDK and Oracle Java SE before 7u51 allows remote attackers to bypass a code-signing protection mechanism and inject unsigned bytecode into a signed JAR file by leveraging improper file validation.
References
Link Resource
http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/d5f36e1c927e Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2015/02/08/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/02/09/9 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:0414 Patch Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1031471 Issue Tracking Patch Third Party Advisory VDB Entry
http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/d5f36e1c927e Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2015/02/08/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/02/09/9 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:0414 Patch Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1031471 Issue Tracking Patch Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update45:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update45_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update45_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update45_b33:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update45_b34:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update7_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update9_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update9_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update11_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update45_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update45_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update45_b33:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update45_b34:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update9_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update9_b32:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/d5f36e1c927e - Patch, Vendor Advisory () http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/d5f36e1c927e - Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2015/02/08/6 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/02/08/6 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/02/09/9 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/02/09/9 - Mailing List, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2014:0414 - Patch, Third Party Advisory, VDB Entry () https://access.redhat.com/errata/RHSA-2014:0414 - Patch, Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1031471 - Issue Tracking, Patch, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=1031471 - Issue Tracking, Patch, Third Party Advisory, VDB Entry

Information

Published : 2017-12-29 22:29

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4578

Mitre link : CVE-2013-4578

CVE.ORG link : CVE-2013-4578


JSON object : View

Products Affected

oracle

  • jdk
  • jre
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')