Movatterモバイル変換


[0]ホーム

URL:


Country
Contact Sales

Oracle Security Alert for CVE-2013-0422

Description

This Security Alert addresses security issues CVE-2013-0422 (US-CERT Alert TA13-010A - Oracle Java 7 Security Manager Bypass Vulnerability) and another vulnerability affecting Java running in web browsers. These vulnerabilities are not applicable to Java running on servers, standalone Java desktop applications or embedded Java applications. They also do not affect Oracle server-based software.

The fixes in this Alert include a change to the default JavaSecurity Level setting from "Medium" to "High". With the "High" setting, the user is always prompted before any unsigned Java applet or Java Web Start application is run.

These vulnerabilities may be remotely exploitable without authentication, i.e., they may be exploited over a network without the need for a username and password. To be successfully exploited, an unsuspecting user running an affected release in a browser will need to visit a malicious web page that leverages these vulnerabilities. Successful exploits can impact the availability, integrity, and confidentiality of the user's system.

Due to the severity of these vulnerabilities, the public disclosure of technical details and the reported exploitation of CVE-2013-0422 "in the wild," Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.

Supported Products Affected

The security vulnerabilities addressed by this Security Alert affect the products listed in the categories below.  Please click on the link in the Patch Availability column or in thePatch Availability Table to access the documentation for those patches.

Affected product releases and versions:

Java SEPatch Availability
JDK and JRE 7 Update 10 and earlierJava SE

Note: JDK and JRE 6, 5.0 and 1.4.2, and Java SE Embedded JRE releases are not affected.

Patch Availability Table and Risk Matrix

Java SE fixes in this Security Alert are cumulative; this latest update includes all fixes from previous Critical Patch Updates and Security Alerts.

Patch Availability Table

Product GroupRisk MatrixPatch Availability and Installation Information
Oracle Java SEOracle JDK and JRE Risk Matrix

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Security Alert to Oracle: Ben Murphy via TippingPoint.

References

Modification History

DateComments
2013-January 13Rev 1. Initial Release

Appendix - Oracle Java SE

Oracle Java SE Executive Summary

This Security Alert contains 2 new security fixes for Oracle Java SE.  Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.   The English text form of this Risk Matrix can be foundhere.

The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Partial" instead of "Complete", lowering the CVSS Base Score. For example, a Base Score of 10.0 becomes 7.5.

Oracle Java SE Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfid­entialityInte­grityAvail­ability
CVE-2012-3174Java Runtime EnvironmentMultipleLibrariesYes10.0NetworkLowNoneCompleteCompleteComplete7 Update 10 and earlierSee Note 1
CVE-2013-0422Java Runtime EnvironmentMultipleLibrariesYes10.0NetworkLowNoneCompleteCompleteComplete7 Update 10 and earlierSee Note 1

Notes:

  1. Applies to client deployment of Java only. This vulnerability can be exploited only through Untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)

[8]ページ先頭

©2009-2025 Movatter.jp