Oracle Security Alert for CVE-2013-1493

Description

This Security Alert addresses security issues CVE-2013-1493 (US-CERT VU#688246) and another vulnerability affecting Java running in web browsers. These vulnerabilities are not applicable to Java running on servers, standalone Java desktop applications or embedded Java applications. They also do not affect Oracle server-based software.

These vulnerabilities may be remotely exploitable without authentication, i.e., they may be exploited over a network without the need for a username and password. For an exploit to be successful, an unsuspecting user running an affected release in a browser must visit a malicious web page that leverages these vulnerabilities. Successful exploits can impact the availability, integrity, and confidentiality of the user's system.

Due to the severity of these vulnerabilities, and the reported exploitation of CVE-2013-1493 "in the wild," Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.

Supported Products Affected

The security vulnerabilities addressed by this Security Alert affect the products listed in the categories below. Please click on the link in the Patch Availability column or in the Patch Availability Table to access the documentation for those patches.

Affected product releases and versions:

Java SE Patch Availability

JDK and JRE 7 Update 15 and earlier Java SE JDK and JRE 6 Update 41 and earlier Java SE JDK and JRE 5.0 Update 40 and earlier Java SE

Patch Availability Table and Risk Matrix

Java SE fixes in this Security Alert are cumulative; this latest update includes all fixes from previous Critical Patch Updates and Security Alerts.

Patch Availability Table

Product Group Risk Matrix Patch Availability and Installation Information Oracle Java SE Oracle JDK and JRE Risk Matrix Oracle Security Alert for CVE-2013-1493 My Oracle Support Note 1533559.1.

Developers can download the latest release from http://www.oracle.com/java/technologies/javase-downloads.html.

Users running Java SE with a browser can download the latest release from http://www.java.com/en/. Users on the Windows platform can also use automatic updates to get the latest release.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Security Alert to Oracle: an Anonymous Reporter of TippingPoint's Zero Day Initiative; axtaxt viaTipping Point's Zero Day Initiative; Darien Kindlund of FireEye; Vitaliy Toropov via iDefense; and Vitaliy Toropov via TippingPoint.

References

Modification History

Date Comments 2013-March-4 Rev 1. Initial Release

Oracle Java SE Executive Summary

This Security Alert contains 2 new security fixes for Oracle Java SE. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here.

The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Partial" instead of "Complete", lowering the CVSS Base Score. For example, a Base Score of 10.0 becomes 7.5.

Oracle Java SE Risk Matrix

CVE# Component Protocol Sub­component Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Access Vector Access Complexity Authen­tication Confid­entiality Inte­grity Avail­ability CVE-2013-0809 Java Runtime Environment Multiple 2D Yes 10.0 Network Low None Complete Complete Complete 7 Update 15 and before, 6 Update 41 and before, 5.0 Update 40 and before See Note 1 CVE-2013-1493 Java Runtime Environment Multiple 2D Yes 10.0 Network Low None Complete Complete Complete 7 Update 15 and before, 6 Update 41 and before, 5.0 Update 40 and before See Note 1

Notes: