Vulnerabilidad en Java Runtime Environment (JRE) (CVE-2013-1571)
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/06/2013
Última modificación:
11/04/2025
Descripción
Vulnerabilidad no especificada en el componente Java Runtime Environment (JRE) en Oracle Java SE 7 Update 21 y anteriores, 6 Update 45 y anteriores, v5.0 Update 45 y anteriores, y JavaFX v2.2.21 y anteriores, permite a atacantes remotos afectar a la integridad mediante vectores relacionados con Javadoc. NOTA: la información anterior es de la CPU de junio de 2013. Oracle no ha comentado las afirmaciones de otro proveedor de que este problema está relacionado con la inyección de marcos en HTML que genera Javadoc.
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:oracle:jdk:*:update45:*:*:*:*:*:* | 1.6.0 (incluyendo) | |
| cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://advisories.mageia.org/MGASA-2013-0185.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
- http://hg.openjdk.java.net/jdk7u/jdk7u-dev/langtools/rev/17ee569d0c01
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
- http://marc.info/?l=bugtraq&m=137545505800971&w=2
- http://marc.info/?l=bugtraq&m=137545592101387&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0963.html
- http://rhn.redhat.com/errata/RHSA-2013-1059.html
- http://rhn.redhat.com/errata/RHSA-2013-1060.html
- http://rhn.redhat.com/errata/RHSA-2013-1081.html
- http://rhn.redhat.com/errata/RHSA-2013-1455.html
- http://rhn.redhat.com/errata/RHSA-2013-1456.html
- http://secunia.com/advisories/54154
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://www-01.ibm.com/support/docview.wss?uid=swg21642336
- http://www-01.ibm.com/support/docview.wss?uid=swg21644197
- http://www.kb.cert.org/vuls/id/225657
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A183
- http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
- http://www.securityfocus.com/bid/60634
- http://www.us-cert.gov/ncas/alerts/TA13-169A
- https://access.redhat.com/errata/RHSA-2014:0414
- https://bugzilla.redhat.com/show_bug.cgi?id=973474
- https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/re0504f08000df786e51795940501e81a5d0ae981ecca68141e87ece0%40%3Ccommits.openoffice.apache.org%3E
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17215
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19518
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19667
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19718
- http://advisories.mageia.org/MGASA-2013-0185.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
- http://hg.openjdk.java.net/jdk7u/jdk7u-dev/langtools/rev/17ee569d0c01
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
- http://marc.info/?l=bugtraq&m=137545505800971&w=2
- http://marc.info/?l=bugtraq&m=137545592101387&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0963.html
- http://rhn.redhat.com/errata/RHSA-2013-1059.html
- http://rhn.redhat.com/errata/RHSA-2013-1060.html
- http://rhn.redhat.com/errata/RHSA-2013-1081.html
- http://rhn.redhat.com/errata/RHSA-2013-1455.html
- http://rhn.redhat.com/errata/RHSA-2013-1456.html
- http://secunia.com/advisories/54154
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://www-01.ibm.com/support/docview.wss?uid=swg21642336
- http://www-01.ibm.com/support/docview.wss?uid=swg21644197
- http://www.kb.cert.org/vuls/id/225657
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A183
- http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
- http://www.securityfocus.com/bid/60634
- http://www.us-cert.gov/ncas/alerts/TA13-169A
- https://access.redhat.com/errata/RHSA-2014:0414
- https://bugzilla.redhat.com/show_bug.cgi?id=973474
- https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/re0504f08000df786e51795940501e81a5d0ae981ecca68141e87ece0%40%3Ccommits.openoffice.apache.org%3E
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17215
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19518
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19667
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19718



