ID CVE-2013-2435
Summary Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440. 1.Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_35:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_35:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_37:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_37:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_38:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_38:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_39:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_39:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_41:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_41:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_43:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_43:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_22:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_22:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_23:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_23:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_24:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_24:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_25:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_25:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_26:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_26:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_27:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_27:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_29:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_29:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_30:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_30:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_31:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_31:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_32:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_32:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_33:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_33:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_34:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_34:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_35:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_35:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_37:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_37:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_38:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_38:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_39:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_39:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_41:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_41:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_43:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_43:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 19-09-2017 - 01:36)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
oval via4
  • accepted 2013-06-03T04:02:49.176-04:00
    class vulnerability
    contributors
    name Sergey Artykhov
    organization ALTX-SOFT
    definition_extensions
    • comment Java SE Runtime Environment 6 is installed
      oval oval:org.mitre.oval:def:16362
    • comment Java SE Runtime Environment 7 is installed
      oval oval:org.mitre.oval:def:16050
    description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.
    family windows
    id oval:org.mitre.oval:def:16213
    status accepted
    submitted 2013-04-17T10:26:26.748+04:00
    title Vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and before, 6 Update 43 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.
    version 5
  • accepted 2015-04-20T04:01:31.909-04:00
    class vulnerability
    contributors
    • name Ganesh Manal
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.
    family unix
    id oval:org.mitre.oval:def:19580
    status accepted
    submitted 2013-11-22T11:43:28.000-05:00
    title HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
    version 46
redhat via4
advisories
  • rhsa
    id RHSA-2013:0757
  • rhsa
    id RHSA-2013:0758
  • rhsa
    id RHSA-2013:1455
  • rhsa
    id RHSA-2013:1456
refmap via4
apple APPLE-SA-2013-04-16-2
bid 59089
cert TA13-107A
confirm http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html
hp
  • HPSBUX02889
  • SSRT101252
suse
  • SUSE-SU-2013:0835
  • SUSE-SU-2013:0871
Last major update 19-09-2017 - 01:36
Published 17-04-2013 - 18:55
Back to Top