10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.974 High
EPSS
Percentile
99.9%
Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote
attackers to execute arbitrary code by (1) using the public
getMBeanInstantiator method in the JmxMBeanServer class to obtain a
reference to a private MBeanInstantiator object, then retrieving arbitrary
Class references using the findClass method, and (2) using the Reflection
API with recursion in a way that bypasses a security check by the
java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to
the inability of the sun.reflect.Reflection.getCallerClass method to skip
frames related to the new reflection API, as exploited in the wild in
January 2013, as demonstrated by Blackhole and Nuclear Pack, and a
different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some
parties have mapped the recursive Reflection API issue to CVE-2012-3174,
but CVE-2012-3174 is for a different vulnerability whose details are not
public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and
Reflection API issues. NOTE: it was originally reported that Java 6 was
also vulnerable, but the reporter has retracted this claim, stating that
Java 6 is not exploitable because the relevant code is called in a way that
does not bypass security checks. NOTE: as of 20130114, a reliable third
party has claimed that the findClass/MBeanInstantiator vector was not fixed
in Oracle Java 7 Update 11. If there is still a vulnerable condition, then
a separate CVE identifier might be created for the unfixed issue.
Author | Note |
---|---|
jdstrand | actively being exploited against Oracle Java. As of 2013-01-12 no updates are available from Oracle. Users are advised to disable or uninstall the Oracle java 7 plugin vulnerability appears to be introduced in Java 7 and Java 6 does not seem affected IcedTea 7 is affected way but the reproducers currently don’t work on Ubuntu. Users are advised to disable and/or uninstall the IcedTea plugin (regardless of version) as a precaution unless its use is strictly required. per mdeslaur, can’t reproduce with icedtea-7-plugin on Ubuntu 12.04 LTS and 12.10 or with icedtea6-plugin on 12.04 LTS. jdstrand could also not reproduce. per mdeslaur, reproducer works with Oracle Java 7u10 on Ubuntu 12.04 LTS and 12.10. Confirmed to also work with 7u9. Fixed in IcedTea 2.2.3 and 2.3.4 |
blog.fireeye.com/research/2013/01/happy-new-year-from-new-java-zero-day.html
krebsonsecurity.com/2013/01/zero-day-java-exploit-debuts-in-crimeware/
labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/
malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html
pastebin.com/cUG2ayjh
www.kb.cert.org/vuls/id/625617
www.oracle.com/technetwork/java/javase/7u11-relnotes-1896856.html
www.reddit.com/r/netsec/comments/16b4n1/0day_exploit_fo_java_17u10_spotted_in_the_wild/c7ulpd7
blogs.oracle.com/security/entry/security_alert_for_cve_2013
github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/java_jre17_jmxbean.rb
github.com/rapid7/metasploit-framework/tree/master/data/exploits/cve-2013-0422
launchpad.net/bugs/cve/CVE-2013-0422
nvd.nist.gov/vuln/detail/CVE-2013-0422
security-tracker.debian.org/tracker/CVE-2013-0422
ubuntu.com/security/notices/USN-1693-1
www.cve.org/CVERecord?id=CVE-2013-0422