The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
13 May 2022, 14:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:*:update_40:*:*:*:*:*:* cpe:2.3:a:oracle:jre:*:update_40:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_22:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_34:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_35:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_35:*:*:*:*:*:* cpe:2.3:a:oracle:jre:*:update_41:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_26:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_30:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_32:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_33:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update_38:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_37:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_37:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_38:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_38:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_31:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_39:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_24:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update_36:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_27:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_39:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_29:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update_38:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:*:update_41:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_23:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_25:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:* |
cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:* cpe:2.3:a:oracle:jre:*:update41:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:*:update41:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:* cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:* |
Information
Published : 2013-03-05 22:06
Updated : 2024-02-04 18:16
NVD link : CVE-2013-1493
Mitre link : CVE-2013-1493
CVE.ORG link : CVE-2013-1493
JSON object : View
Products Affected
oracle
- jdk
- jre
sun
- jre
- jdk
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer