Lucene search

K
cve[email protected]CVE-2013-2461
HistoryJun 18, 2013 - 10:55 p.m.

CVE-2013-2461

2013-06-1822:55:02
web.nvd.nist.gov
133
cve-2013-2461
java
jre
oracle
remote attack
confidentiality
integrity
availability
vulnerability
openjdk
jrockit
fusion middleware

6.2 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.683 Medium

EPSS

Percentile

98.0%

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier; the Oracle JRockit component in Oracle Fusion Middleware R27.7.5 and earlier and R28.2.7 and earlier; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June and July 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass verification of XML signatures via vectors related to a “Missing check for [a] valid DOMCanonicalizationMethod canonicalization algorithm.”

Affected configurations

NVD
Node
oraclejdkMatch1.6.0update22
OR
oraclejdkMatch1.6.0update23
OR
oraclejdkMatch1.6.0update24
OR
oraclejdkMatch1.6.0update25
OR
oraclejdkMatch1.6.0update26
OR
oraclejdkMatch1.6.0update27
OR
oraclejdkMatch1.6.0update29
OR
oraclejdkMatch1.6.0update30
OR
oraclejdkMatch1.6.0update31
OR
oraclejdkMatch1.6.0update32
OR
oraclejdkMatch1.6.0update33
OR
oraclejdkMatch1.6.0update34
OR
oraclejdkMatch1.6.0update35
OR
oraclejdkMatch1.6.0update37
OR
oraclejdkMatch1.6.0update38
OR
oraclejdkMatch1.6.0update39
OR
oraclejdkMatch1.6.0update41
OR
oraclejdkMatch1.6.0update43
OR
sunjdkMatch1.6.0
OR
sunjdkMatch1.6.0update_10
OR
sunjdkMatch1.6.0update_11
OR
sunjdkMatch1.6.0update_12
OR
sunjdkMatch1.6.0update_13
OR
sunjdkMatch1.6.0update_14
OR
sunjdkMatch1.6.0update_15
OR
sunjdkMatch1.6.0update_16
OR
sunjdkMatch1.6.0update_17
OR
sunjdkMatch1.6.0update_18
OR
sunjdkMatch1.6.0update_19
OR
sunjdkMatch1.6.0update_20
OR
sunjdkMatch1.6.0update_21
OR
sunjdkMatch1.6.0update_3
OR
sunjdkMatch1.6.0update_4
OR
sunjdkMatch1.6.0update_5
OR
sunjdkMatch1.6.0update_6
OR
sunjdkMatch1.6.0update_7
OR
sunjdkMatch1.6.0update1
OR
sunjdkMatch1.6.0update1_b06
OR
sunjdkMatch1.6.0update2
Node
oraclejreMatch1.7.0
OR
oraclejreMatch1.7.0update1
OR
oraclejreMatch1.7.0update10
OR
oraclejreMatch1.7.0update11
OR
oraclejreMatch1.7.0update13
OR
oraclejreMatch1.7.0update15
OR
oraclejreMatch1.7.0update17
OR
oraclejreMatch1.7.0update2
OR
oraclejreMatch1.7.0update3
OR
oraclejreMatch1.7.0update4
OR
oraclejreMatch1.7.0update5
OR
oraclejreMatch1.7.0update6
OR
oraclejreMatch1.7.0update7
OR
oraclejreMatch1.7.0update9
Node
oraclejrockitRanger27.7.1r27.7.5
OR
oraclejrockitRanger28.0.0r28.2.7
OR
oracleopenjdkMatch1.7.0

References

6.2 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.683 Medium

EPSS

Percentile

98.0%