Rapid7 Vulnerability & Exploit Database

RHSA-2013:0957: java-1.7.0-openjdk security update

Back to Search

RHSA-2013:0957: java-1.7.0-openjdk security update



These packages provide the OpenJDK 7 Java Runtime Environment and theOpenJDK 7 Software Development Kit.Multiple flaws were discovered in the ImagingLib and the image attribute,channel, layout and raster processing in the 2D component. An untrustedJava application or applet could possibly use these flaws to trigger JavaVirtual Machine memory corruption. (CVE-2013-2470, CVE-2013-2471,CVE-2013-2472, CVE-2013-2473, CVE-2013-2463, CVE-2013-2465, CVE-2013-2469)Integer overflow flaws were found in the way AWT processed certain input.An attacker could use these flaws to execute arbitrary code with theprivileges of the user running an untrusted Java applet or application.(CVE-2013-2459)Multiple improper permission check issues were discovered in the Sound,JDBC, Libraries, JMX, and Serviceability components in OpenJDK. Anuntrusted Java application or applet could use these flaws to bypass Javasandbox restrictions. (CVE-2013-2448, CVE-2013-2454, CVE-2013-2458,CVE-2013-2457, CVE-2013-2453, CVE-2013-2460)Multiple flaws in the Serialization, Networking, Libraries and CORBAcomponents can be exploited by an untrusted Java application or applet togain access to potentially sensitive information. (CVE-2013-2456,CVE-2013-2447, CVE-2013-2455, CVE-2013-2452, CVE-2013-2443, CVE-2013-2446)It was discovered that the Hotspot component did not properly handleout-of-memory errors. An untrusted Java application or applet couldpossibly use these flaws to terminate the Java Virtual Machine.(CVE-2013-2445)It was discovered that the AWT component did not properly manage certainresources and that the ObjectStreamClass of the Serialization componentdid not properly handle circular references. An untrusted Java applicationor applet could possibly use these flaws to cause a denial of service.(CVE-2013-2444, CVE-2013-2450)It was discovered that the Libraries component contained certain errorsrelated to XML security and the class loader. A remote attacker couldpossibly exploit these flaws to bypass intended security mechanisms ordisclose potentially sensitive information and cause a denial of service.(CVE-2013-2407, CVE-2013-2461)It was discovered that JConsole did not properly inform the user whenestablishing an SSL connection failed. An attacker could exploit this flawto gain access to potentially sensitive information. (CVE-2013-2412)It was discovered that GnomeFileTypeDetector did not check for readpermissions when accessing files. An untrusted Java application or appletcould possibly use this flaw to disclose potentially sensitive information.(CVE-2013-2449)It was found that documentation generated by Javadoc was vulnerable to aframe injection attack. If such documentation was accessible over anetwork, and a remote attacker could trick a user into visiting aspecially-crafted URL, it would lead to arbitrary web content beingdisplayed next to the documentation. This could be used to perform aphishing attack by providing frame content that spoofed a login form onthe site hosting the vulnerable documentation. (CVE-2013-1571)It was discovered that the 2D component created shared memory segments withinsecure permissions. A local attacker could use this flaw to read or writeto the shared memory segment. (CVE-2013-1500)Red Hat would like to thank Tim Brown for reporting CVE-2013-1500, andUS-CERT for reporting CVE-2013-1571. US-CERT acknowledges Oracle as theoriginal reporter of CVE-2013-1571.Note: If the web browser plug-in provided by the icedtea-web package wasinstalled, the issues exposed via Java applets could have been exploitedwithout user interaction if a user visited a malicious website.After installing this update, users of icedtea-web must installRHBA-2013:0959 for icedtea-web to continue functioning.This erratum also upgrades the OpenJDK package to IcedTea7 2.3.10. Refer tothe NEWS file, linked to in the References, for further information.


  • redhat-upgrade-java-1-7-0-openjdk
  • redhat-upgrade-java-1-7-0-openjdk-debuginfo
  • redhat-upgrade-java-1-7-0-openjdk-demo
  • redhat-upgrade-java-1-7-0-openjdk-devel
  • redhat-upgrade-java-1-7-0-openjdk-javadoc
  • redhat-upgrade-java-1-7-0-openjdk-src

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center