Rapid7 VulnDB

HP-UX: CVE-2013-2451: Running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities

Back to Search

HP-UX: CVE-2013-2451: Running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities

Severity
4
CVSS
(AV:L/AC:H/Au:N/C:P/I:P/A:P)
Published
06/18/2013
Created
07/25/2018
Added
08/11/2017
Modified
01/08/2018

Description

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.

Solution(s)

  • hpux-update-jdk60-jdk60-com
  • hpux-update-jdk60-jdk60-ipf32
  • hpux-update-jdk60-jdk60-ipf64
  • hpux-update-jdk60-jdk60-pa20
  • hpux-update-jdk60-jdk60-pa20w
  • hpux-update-jre60-jre60-com
  • hpux-update-jre60-jre60-com-doc
  • hpux-update-jre60-jre60-ipf32
  • hpux-update-jre60-jre60-ipf32-hs
  • hpux-update-jre60-jre60-ipf64
  • hpux-update-jre60-jre60-ipf64-hs
  • hpux-update-jre60-jre60-pa20
  • hpux-update-jre60-jre60-pa20-hs
  • hpux-update-jre60-jre60-pa20w
  • hpux-update-jre60-jre60-pa20w-hs

References

  • hpux-update-jdk60-jdk60-com
  • hpux-update-jdk60-jdk60-ipf32
  • hpux-update-jdk60-jdk60-ipf64
  • hpux-update-jdk60-jdk60-pa20
  • hpux-update-jdk60-jdk60-pa20w
  • hpux-update-jre60-jre60-com
  • hpux-update-jre60-jre60-com-doc
  • hpux-update-jre60-jre60-ipf32
  • hpux-update-jre60-jre60-ipf32-hs
  • hpux-update-jre60-jre60-ipf64
  • hpux-update-jre60-jre60-ipf64-hs
  • hpux-update-jre60-jre60-pa20
  • hpux-update-jre60-jre60-pa20-hs
  • hpux-update-jre60-jre60-pa20w
  • hpux-update-jre60-jre60-pa20w-hs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;