ID CVE-2013-0430
Summary Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the installation process of the client. Per http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html "Applies to installation process on client deployment of Java."
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_35:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_35:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_37:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_37:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_38:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_38:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_22:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_22:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_23:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_23:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_24:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_24:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_25:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_25:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_26:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_26:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_27:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_27:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_29:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_29:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_30:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_30:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_31:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_31:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_32:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_32:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_33:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_33:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_34:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_34:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_35:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_35:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_37:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_37:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_38:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_38:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
CVSS
Base: 6.9 (as of 19-09-2017 - 01:35)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:M/Au:N/C:C/I:C/A:C
oval via4
accepted 2013-06-10T04:01:19.475-04:00
class vulnerability
contributors
name Sergey Artykhov
organization ALTX-SOFT
definition_extensions
  • comment Java SE Runtime Environment 6 is installed
    oval oval:org.mitre.oval:def:16362
  • comment Java SE Runtime Environment 7 is installed
    oval oval:org.mitre.oval:def:16050
description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the installation process of the client.
family windows
id oval:org.mitre.oval:def:16600
status accepted
submitted 2013-04-22T10:26:26.748+04:00
title Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE (subcomponent: Install) 7 through Update 11 and 6 through Update 38, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the installation process of the client.
version 5
redhat via4
advisories
  • rhsa
    id RHSA-2013:0236
  • rhsa
    id RHSA-2013:0237
refmap via4
bid 57722
cert TA13-032A
cert-vn VU#858729
confirm http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
hp
  • HPSBMU02874
  • SSRT101184
Last major update 19-09-2017 - 01:35
Published 02-02-2013 - 00:55
Back to Top