7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
java is vulnerable to arbitrary code execution. The vulnerability exists through 2D.
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
lists.apple.com/archives/security-announce/2013/Apr/msg00001.html
lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html
lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html
lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html
marc.info/?l=bugtraq&m=137283787217316&w=2
rhn.redhat.com/errata/RHSA-2013-0757.html
rhn.redhat.com/errata/RHSA-2013-0758.html
rhn.redhat.com/errata/RHSA-2013-1455.html
rhn.redhat.com/errata/RHSA-2013-1456.html
www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html
www.securityfocus.com/bid/59172
www.us-cert.gov/ncas/alerts/TA13-107A
access.redhat.com/security/updates/classification/#critical
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16162
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19500
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19554
rhn.redhat.com/errata/RHSA-2013-0823.html
www.ibm.com/developerworks/java/jdk/alerts/