Mac OS X : Java for OS X 2013-002

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote host has a version of Java that is affected by multiple
vulnerabilities.

Description :

The remote Mac OS X 10.7 or 10.8 host has a Java runtime that is
missing the Java for OS X 2013-002 update, which updates the Java
version to 1.6.0_43. It is, therefore, affected by two security
vulnerabilities, the most serious of which may allow an untrusted Java
applet to execute arbitrary code with the privileges of the current user
outside the Java sandbox.

Note that an exploit for CVE-2013-1493 has been observed in the wild.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-13-142/
http://www.zerodayinitiative.com/advisories/ZDI-13-148/
http://www.zerodayinitiative.com/advisories/ZDI-13-149/
http://www.oracle.com/technetwork/java/javase/6u43-relnotes-1915290.html
http://support.apple.com/kb/HT5677
http://lists.apple.com/archives/security-announce/2013/Mar/msg00000.html
http://www.securityfocus.com/archive/1/525890/30/0/threaded

Solution :

Apply the Java for OS X 2013-002 update, which includes version
14.6.1 of the JavaVM Framework.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 65028 ()

Bugtraq ID: 58238
58296

CVE ID: CVE-2013-0809
CVE-2013-1493