Back to search

SUSE Linux Security Advisory: SUSE-SU-2013:0199-1

Severity CVSS Published Added Modified
10 (AV:N/AC:L/Au:N/C:C/I:C/A:C) January 10, 2013 December 12, 2013 December 12, 2013

Available Exploits 

Description

Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.

Free Nexpose Download

Discover, prioritize, and remediate security risks today!

 Download now

References

Solution

  • Upgrade java-1_7_0-openjdk

    Please upgrade java-1_7_0-openjdk using an update manager like YaST or zypper

  • Upgrade java-1_7_0-openjdk-demo

    Please upgrade java-1_7_0-openjdk-demo using an update manager like YaST or zypper

  • Upgrade java-1_7_0-openjdk-devel

    Please upgrade java-1_7_0-openjdk-devel using an update manager like YaST or zypper

  • Upgrade java-1_7_0-openjdk-javadoc

    Please upgrade java-1_7_0-openjdk-javadoc using an update manager like YaST or zypper

  • Upgrade java-1_7_0-openjdk-src

    Please upgrade java-1_7_0-openjdk-src using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm-32bit

    Please upgrade java-1_5_0-ibm-32bit using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm-alsa-32bit

    Please upgrade java-1_5_0-ibm-alsa-32bit using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm-alsa

    Please upgrade java-1_5_0-ibm-alsa using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm-demo

    Please upgrade java-1_5_0-ibm-demo using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm-devel-32bit

    Please upgrade java-1_5_0-ibm-devel-32bit using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm-devel

    Please upgrade java-1_5_0-ibm-devel using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm-fonts

    Please upgrade java-1_5_0-ibm-fonts using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm-jdbc

    Please upgrade java-1_5_0-ibm-jdbc using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm-plugin

    Please upgrade java-1_5_0-ibm-plugin using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm-src

    Please upgrade java-1_5_0-ibm-src using an update manager like YaST or zypper

  • Upgrade java-1_5_0-ibm

    Please upgrade java-1_5_0-ibm using an update manager like YaST or zypper

Related Vulnerabilities