Vulnerabilidad en Java Runtime Environment (JRE) (CVE-2013-3743)
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/06/2013
Última modificación:
11/04/2025
Descripción
Vulnerabilidad no especificada en el componente Java Runtime Environment (JRE) en Oracle Java SE 6 Update 45 y anteriores y v5.0 Update 45 y anteriores permite a atacantes remotos afectar a la integridad, confidencialidad y disponibilidad mediante vectores relacionados con AWT.
Impacto
Puntuación base 2.0
9.30
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:oracle:jre:*:update45:*:*:*:*:*:* | 1.6.0 (incluyendo) | |
| cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
- http://marc.info/?l=bugtraq&m=137545505800971&w=2
- http://marc.info/?l=bugtraq&m=137545592101387&w=2
- http://rhn.redhat.com/errata/RHSA-2013-1059.html
- http://rhn.redhat.com/errata/RHSA-2013-1081.html
- http://rhn.redhat.com/errata/RHSA-2013-1455.html
- http://rhn.redhat.com/errata/RHSA-2013-1456.html
- http://secunia.com/advisories/54154
- http://www-01.ibm.com/support/docview.wss?uid=swg21642336
- http://www-01.ibm.com/support/docview.wss?uid=swg21644197
- http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
- http://www.securityfocus.com/bid/60626
- http://www.us-cert.gov/ncas/alerts/TA13-169A
- https://access.redhat.com/errata/RHSA-2014:0414
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17202
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18758
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19453
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19591
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
- http://marc.info/?l=bugtraq&m=137545505800971&w=2
- http://marc.info/?l=bugtraq&m=137545592101387&w=2
- http://rhn.redhat.com/errata/RHSA-2013-1059.html
- http://rhn.redhat.com/errata/RHSA-2013-1081.html
- http://rhn.redhat.com/errata/RHSA-2013-1455.html
- http://rhn.redhat.com/errata/RHSA-2013-1456.html
- http://secunia.com/advisories/54154
- http://www-01.ibm.com/support/docview.wss?uid=swg21642336
- http://www-01.ibm.com/support/docview.wss?uid=swg21644197
- http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
- http://www.securityfocus.com/bid/60626
- http://www.us-cert.gov/ncas/alerts/TA13-169A
- https://access.redhat.com/errata/RHSA-2014:0414
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17202
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18758
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19453
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19591



