Lucene search

K
cveRedhatCVE-2013-4578
HistoryDec 29, 2017 - 10:29 p.m.

CVE-2013-4578

2017-12-2922:29:00
CWE-74
redhat
web.nvd.nist.gov
27
cve
jarsigner
openjdk
oracle java se
code-signing
vulnerability
bytecode injection
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

4.7

Confidence

High

EPSS

0.003

Percentile

70.0%

jarsigner in OpenJDK and Oracle Java SE before 7u51 allows remote attackers to bypass a code-signing protection mechanism and inject unsigned bytecode into a signed JAR file by leveraging improper file validation.

Affected configurations

Nvd
Node
oraclejdkMatch1.7.0update1
OR
oraclejdkMatch1.7.0update10
OR
oraclejdkMatch1.7.0update10_b31
OR
oraclejdkMatch1.7.0update11
OR
oraclejdkMatch1.7.0update11_b32
OR
oraclejdkMatch1.7.0update13
OR
oraclejdkMatch1.7.0update15
OR
oraclejdkMatch1.7.0update17
OR
oraclejdkMatch1.7.0update17_b31
OR
oraclejdkMatch1.7.0update17_b32
OR
oraclejdkMatch1.7.0update2
OR
oraclejdkMatch1.7.0update21
OR
oraclejdkMatch1.7.0update21_b31
OR
oraclejdkMatch1.7.0update25
OR
oraclejdkMatch1.7.0update25_b33
OR
oraclejdkMatch1.7.0update25_b34
OR
oraclejdkMatch1.7.0update25_b35
OR
oraclejdkMatch1.7.0update3
OR
oraclejdkMatch1.7.0update4
OR
oraclejdkMatch1.7.0update40
OR
oraclejdkMatch1.7.0update45
OR
oraclejdkMatch1.7.0update45_b31
OR
oraclejdkMatch1.7.0update45_b32
OR
oraclejdkMatch1.7.0update45_b33
OR
oraclejdkMatch1.7.0update45_b34
OR
oraclejdkMatch1.7.0update5
OR
oraclejdkMatch1.7.0update51
OR
oraclejdkMatch1.7.0update6
OR
oraclejdkMatch1.7.0update7
OR
oraclejdkMatch1.7.0update7_b32
OR
oraclejdkMatch1.7.0update9
OR
oraclejdkMatch1.7.0update9_b31
OR
oraclejdkMatch1.7.0update9_b32
OR
oraclejreMatch1.7.0update1
OR
oraclejreMatch1.7.0update10
OR
oraclejreMatch1.7.0update10_b31
OR
oraclejreMatch1.7.0update11
OR
oraclejreMatch1.7.0update11_b32
OR
oraclejreMatch1.7.0update13
OR
oraclejreMatch1.7.0update15
OR
oraclejreMatch1.7.0update17
OR
oraclejreMatch1.7.0update17_b31
OR
oraclejreMatch1.7.0update17_b32
OR
oraclejreMatch1.7.0update2
OR
oraclejreMatch1.7.0update21
OR
oraclejreMatch1.7.0update21_b31
OR
oraclejreMatch1.7.0update25
OR
oraclejreMatch1.7.0update25_b33
OR
oraclejreMatch1.7.0update25_b34
OR
oraclejreMatch1.7.0update25_b35
OR
oraclejreMatch1.7.0update3
OR
oraclejreMatch1.7.0update4
OR
oraclejreMatch1.7.0update40
OR
oraclejreMatch1.7.0update45
OR
oraclejreMatch1.7.0update45_b31
OR
oraclejreMatch1.7.0update45_b32
OR
oraclejreMatch1.7.0update45_b33
OR
oraclejreMatch1.7.0update45_b34
OR
oraclejreMatch1.7.0update5
OR
oraclejreMatch1.7.0update51
OR
oraclejreMatch1.7.0update6
OR
oraclejreMatch1.7.0update7
OR
oraclejreMatch1.7.0update7_b32
OR
oraclejreMatch1.7.0update9
OR
oraclejreMatch1.7.0update9_b31
OR
oraclejreMatch1.7.0update9_b32
Node
oraclejdkRange1.7.0
OR
oraclejreRange1.7.0
VendorProductVersionCPE
oraclejdk1.7.0cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
oraclejdk1.7.0cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
oraclejdk1.7.0cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*
oraclejdk1.7.0cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
oraclejdk1.7.0cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*
oraclejdk1.7.0cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
oraclejdk1.7.0cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*
oraclejdk1.7.0cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*
oraclejdk1.7.0cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*
oraclejdk1.7.0cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*
Rows per page:
1-10 of 681

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

4.7

Confidence

High

EPSS

0.003

Percentile

70.0%