CVE-2013-1481
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/02/2013
Last modified:
11/04/2025
Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00034.html
- http://marc.info/?l=bugtraq&m=136570436423916&w=2
- http://marc.info/?l=bugtraq&m=136570436423916&w=2
- http://marc.info/?l=bugtraq&m=136733161405818&w=2
- http://marc.info/?l=bugtraq&m=136733161405818&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0236.html
- http://rhn.redhat.com/errata/RHSA-2013-1455.html
- http://rhn.redhat.com/errata/RHSA-2013-1456.html
- http://www.kb.cert.org/vuls/id/858729
- http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
- http://www.securityfocus.com/bid/57718
- http://www.us-cert.gov/cas/techalerts/TA13-032A.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16430
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19170
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19268
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00034.html
- http://marc.info/?l=bugtraq&m=136570436423916&w=2
- http://marc.info/?l=bugtraq&m=136570436423916&w=2
- http://marc.info/?l=bugtraq&m=136733161405818&w=2
- http://marc.info/?l=bugtraq&m=136733161405818&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0236.html
- http://rhn.redhat.com/errata/RHSA-2013-1455.html
- http://rhn.redhat.com/errata/RHSA-2013-1456.html
- http://www.kb.cert.org/vuls/id/858729
- http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
- http://www.securityfocus.com/bid/57718
- http://www.us-cert.gov/cas/techalerts/TA13-032A.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16430
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19170
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19268



