CVE-2013-4578

jarsigner in OpenJDK and Oracle Java SE before 7u51 allows remote attackers to bypass a code-signing protection mechanism and inject unsigned bytecode into a signed JAR file by leveraging improper file validation.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1031471 Issue Tracking Patch Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2014:0414 Patch Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2015/02/09/9 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/02/08/6 Mailing List Third Party Advisory
http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/d5f36e1c927e Patch Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:jre:1.7.0:update45_b34:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update45_b33:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update45_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update45_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update11_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update45_b33:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update45_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update9_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update45_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update45:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update9_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update9_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update7_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update9_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update45_b34:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*

Information

Published : 2017-12-29 14:29

Updated : 2018-01-17 09:59


NVD link : CVE-2013-4578

Mitre link : CVE-2013-4578


JSON object : View

CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Advertisement

dedicated server usa

Products Affected

oracle

  • jdk
  • jre