CVE-2013-2423
KEV
🔴 Łataj teraz
Nieokreślona podatność w Java Runtime Environment umożliwia zdalnym atakującym obejście kontroli uprawnień.
CVSS
3.7
EPSS
93.4%
Exploit
weaponized
Vendor
oracle
Opis źródłowy (NVD)
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 3.7 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 93.4% |
| Opublikowano (NVD) | 2013-04-17 18:55:07 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 13:06:26 UTC |
Referencje
- http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/ (secalert_us@oracle.com) [Broken Link]
- http://blog.spiderlabs.com/2013/04/java-is-so-confusing.html (secalert_us@oracle.com) [Not Applicable]
- http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/b453d9be6b3f (secalert_us@oracle.com) [Patch]
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html (secalert_us@oracle.com) [Third Party Advisory]
- http://rhn.redhat.com/errata/RHSA-2013-0752.html (secalert_us@oracle.com) [Third Party Advisory]
- http://rhn.redhat.com/errata/RHSA-2013-0757.html (secalert_us@oracle.com) [Third Party Advisory]
- http://security.gentoo.org/glsa/glsa-201406-32.xml (secalert_us@oracle.com) [Third Party Advisory]
- http://weblog.ikvm.net/PermaLink.aspx?guid=acd2dd6d-1028-4996-95df-efa42ac237f0 (secalert_us@oracle.com) [Broken Link]
- http://www.exploit-db.com/exploits/24976 (secalert_us@oracle.com) [Third Party Advisory, VDB Entry]
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:161 (secalert_us@oracle.com) [Third Party Advisory]
- http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html (secalert_us@oracle.com) [Vendor Advisory]
- http://www.ubuntu.com/usn/USN-1806-1 (secalert_us@oracle.com) [Third Party Advisory]
- http://www.us-cert.gov/ncas/alerts/TA13-107A (secalert_us@oracle.com) [Third Party Advisory, US Government Resource]
- https://bugzilla.redhat.com/show_bug.cgi?id=952398 (secalert_us@oracle.com) [Issue Tracking]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16700 (secalert_us@oracle.com) [Broken Link]
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130 (secalert_us@oracle.com) [Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-2423 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]