Vulnerability & Exploit Database

Back to search

RHSA-2013:0605: java-1.6.0-openjdk security update

Severity CVSS Published Added Modified
10 (AV:N/AC:L/Au:N/C:C/I:C/A:C) March 05, 2013 March 08, 2013 July 04, 2017

Available Exploits 


These packages provide the OpenJDK 6 Java Runtime Environment and theOpenJDK 6 Software Development Kit.An integer overflow flaw was found in the way the 2D component handledcertain sample model instances. A specially-crafted sample model instancecould cause Java Virtual Machine memory corruption and, possibly, lead toarbitrary code execution with virtual machine privileges. (CVE-2013-0809)It was discovered that the 2D component did not properly reject certainmalformed images. Specially-crafted raster parameters could cause JavaVirtual Machine memory corruption and, possibly, lead to arbitrary codeexecution with virtual machine privileges. (CVE-2013-1493)Note: If your system has not yet been upgraded to Red Hat Enterprise Linux6.4 and the web browser plug-in provided by the icedtea-web package wasinstalled, the issues exposed via Java applets could have been exploitedwithout user interaction if a user visited a malicious website. Thus, thisupdate has been rated as having critical security impact as a one timeexception. The icedtea-web package as provided with Red Hat EnterpriseLinux 6.4 uses OpenJDK 7 instead.This erratum also upgrades the OpenJDK package to IcedTea6 1.11.9. Refer tothe NEWS file, linked to in the References, for further information.All users of java-1.6.0-openjdk are advised to upgrade to these updatedpackages, which resolve these issues. All running instances of OpenJDK Javamust be restarted for the update to take effect.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial


Solution Reference

Java Security Update



Related Vulnerabilities