Rapid7 VulnDB

SUSE Linux Security Vulnerability: CVE-2013-1475

Back to Search

SUSE Linux Security Vulnerability: CVE-2013-1475

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
02/01/2013
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "IIOP type reuse management" in ObjectStreamClass.java.

Solution(s)

  • suse-upgrade-java-1_6_0-openjdk
  • suse-upgrade-java-1_6_0-openjdk-debuginfo
  • suse-upgrade-java-1_6_0-openjdk-debugsource
  • suse-upgrade-java-1_6_0-openjdk-demo
  • suse-upgrade-java-1_6_0-openjdk-demo-debuginfo
  • suse-upgrade-java-1_6_0-openjdk-devel
  • suse-upgrade-java-1_6_0-openjdk-devel-debuginfo
  • suse-upgrade-java-1_6_0-openjdk-javadoc
  • suse-upgrade-java-1_6_0-openjdk-src
  • suse-upgrade-java-1_7_0-openjdk
  • suse-upgrade-java-1_7_0-openjdk-demo
  • suse-upgrade-java-1_7_0-openjdk-devel
  • suse-upgrade-java-1_7_0-openjdk-javadoc
  • suse-upgrade-java-1_7_0-openjdk-src

References

  • suse-upgrade-java-1_6_0-openjdk
  • suse-upgrade-java-1_6_0-openjdk-debuginfo
  • suse-upgrade-java-1_6_0-openjdk-debugsource
  • suse-upgrade-java-1_6_0-openjdk-demo
  • suse-upgrade-java-1_6_0-openjdk-demo-debuginfo
  • suse-upgrade-java-1_6_0-openjdk-devel
  • suse-upgrade-java-1_6_0-openjdk-devel-debuginfo
  • suse-upgrade-java-1_6_0-openjdk-javadoc
  • suse-upgrade-java-1_6_0-openjdk-src
  • suse-upgrade-java-1_7_0-openjdk
  • suse-upgrade-java-1_7_0-openjdk-demo
  • suse-upgrade-java-1_7_0-openjdk-devel
  • suse-upgrade-java-1_7_0-openjdk-javadoc
  • suse-upgrade-java-1_7_0-openjdk-src

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;