jarsigner in OpenJDK and Oracle Java SE before 7u51 allows remote attackers to bypass a code-signing protection mechanism and inject unsigned bytecode into a signed JAR file by leveraging improper file validation.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1031471 | Issue Tracking Patch Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2014:0414 | Patch Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/02/09/9 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/02/08/6 | Mailing List Third Party Advisory |
http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/d5f36e1c927e | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-12-29 14:29
Updated : 2018-01-17 09:59
NVD link : CVE-2013-4578
Mitre link : CVE-2013-4578
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
oracle
- jdk
- jre