Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
Configuration 5 (hide)
| 
 | 
Configuration 6 (hide)
| 
 | 
History
                    21 Nov 2024, 01:51
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://advisories.mageia.org/MGASA-2013-0185.html - | |
| References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880 - | |
| References | () http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/ffef9e05564e - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html - | |
| References | () http://marc.info/?l=bugtraq&m=137545505800971&w=2 - | |
| References | () http://marc.info/?l=bugtraq&m=137545592101387&w=2 - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0963.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-1059.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-1060.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-1081.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-1455.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-1456.html - | |
| References | () http://secunia.com/advisories/54154 - | |
| References | () http://security.gentoo.org/glsa/glsa-201406-32.xml - | |
| References | () http://www-01.ibm.com/support/docview.wss?uid=swg21642336 - | |
| References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:183 - | |
| References | () http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html - Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/60632 - | |
| References | () http://www.us-cert.gov/ncas/alerts/TA13-169A - US Government Resource | |
| References | () https://access.redhat.com/errata/RHSA-2014:0414 - | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=975133 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17256 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19276 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19638 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19696 - | 
13 May 2022, 14:52
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update_41:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update_39:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_22:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update_41:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_34:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_35:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_35:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_26:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_43:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_30:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_32:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_33:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update_38:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_37:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_37:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update_39:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_41:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update_40:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_38:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_43:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_38:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_31:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_24:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_39:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:*:update_45:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update_36:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_27:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_39:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_29:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update_38:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update_40:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_41:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_23:*:*:*:*:*:* cpe:2.3:a:oracle:jre:*:update_45:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update_25:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:* | cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:*:update45:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update39:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update40:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:* cpe:2.3:a:oracle:jre:*:update45:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update40:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update41:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update39:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update43:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update41:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.5.0:update41:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:* | 
Information
                Published : 2013-06-18 22:55
Updated : 2025-04-11 00:51
NVD link : CVE-2013-2457
Mitre link : CVE-2013-2457
CVE.ORG link : CVE-2013-2457
JSON object : View
Products Affected
                sun
- jre
- jdk
oracle
- jre
- jdk
CWE
                