CVE-2013-3009

HIGH

Description

The com.ibm.CORBA.iiop.ClientDelegate class in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 improperly exposes the invoke method of the java.lang.reflect.Method class, which allows remote attackers to call setSecurityManager and bypass a sandbox protection mechanism via vectors related to the AccessController doPrivileged block.

References

http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html

http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html

http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html

http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html

http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html

http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html

http://rhn.redhat.com/errata/RHSA-2013-1059.html

http://rhn.redhat.com/errata/RHSA-2013-1060.html

http://rhn.redhat.com/errata/RHSA-2013-1081.html

http://seclists.org/fulldisclosure/2016/Apr/20

http://seclists.org/fulldisclosure/2016/Apr/3

http://secunia.com/advisories/54154

http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013

http://www.security-explorations.com/materials/SE-2012-01-IBM-2.pdf

http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf

http://www-01.ibm.com/support/docview.wss?uid=swg1IV44792

http://www-01.ibm.com/support/docview.wss?uid=swg1IX90118

http://www-01.ibm.com/support/docview.wss?uid=swg1PM91727

http://www-01.ibm.com/support/docview.wss?uid=swg21642336

http://www-01.ibm.com/support/docview.wss?uid=swg21644197

https://exchange.xforce.ibmcloud.com/vulnerabilities/84150

Details

Source: MITRE

Published: 2013-07-23

Updated: 2017-11-29

Risk Information

CVSS v2.0

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:ibm:java:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.2:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.3:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.4:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.5:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.6:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.7:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.8:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.9:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.10:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.11:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.12:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.13:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.14:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.15:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.16:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:1.4.2.13.17:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
119977SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2016:1303-1)NessusSuSE Local Security Checks
critical
91319SUSE SLES10 Security Update : IBM Java 1.6.0 (SUSE-SU-2016:1388-1)NessusSuSE Local Security Checks
critical
91309SUSE SLES11 Security Update : java-1_6_0-ibm (SUSE-SU-2016:1379-1)NessusSuSE Local Security Checks
critical
91308SUSE SLES11 Security Update : java-1_7_0-ibm (SUSE-SU-2016:1378-1)NessusSuSE Local Security Checks
critical
91161SUSE SLES11 Security Update : java-1_7_1-ibm (SUSE-SU-2016:1300-1)NessusSuSE Local Security Checks
critical
91160SUSE SLES12 Security Update : java-1_7_1-ibm (SUSE-SU-2016:1299-1)NessusSuSE Local Security Checks
critical
83595SUSE SLES11 Security Update : java-1_7_0-ibm (SUSE-SU-2013:1256-1)NessusSuSE Local Security Checks
critical
71861IBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (credentialed check)NessusWindows
critical
71859IBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (uncredentialed check)NessusMisc.
critical
70744IBM Notes 8.5.x < 8.5.3 FP5 Multiple VulnerabilitiesNessusWindows
critical
70743IBM Domino 8.5.x < 8.5.3 FP5 Multiple VulnerabilitiesNessusWindows
critical
70742IBM Domino 8.5.x < 8.5.3 FP 5 Multiple VulnerabilitiesNessusMisc.
critical
69093SuSE 10 Security Update : java-1_5_0-ibm (ZYPP Patch Number 8653)NessusSuSE Local Security Checks
critical
69092SuSE 10 Security Update : java-1_4_2-ibm (ZYPP Patch Number 8652)NessusSuSE Local Security Checks
critical
69090SuSE 11.2 Security Update : java-1_4_2-ibm (SAT Patch Number 8109)NessusSuSE Local Security Checks
critical
69072SuSE 10 Security Update : java-1_6_0-ibm (ZYPP Patch Number 8657)NessusSuSE Local Security Checks
critical
69070SuSE 11.2 / 11.3 Security Update : java-1_7_0-ibm (SAT Patch Numbers 8106 / 8108)NessusSuSE Local Security Checks
critical
69069SuSE 11.2 / 11.3 Security Update : java-1_6_0-ibm (SAT Patch Numbers 8105 / 8107)NessusSuSE Local Security Checks
critical
68922RHEL 5 / 6 : java-1.5.0-ibm (RHSA-2013:1081)NessusRed Hat Local Security Checks
critical
68901RHEL 5 / 6 : java-1.7.0-ibm (RHSA-2013:1060)NessusRed Hat Local Security Checks
critical
68900RHEL 5 / 6 : java-1.6.0-ibm (RHSA-2013:1059)NessusRed Hat Local Security Checks
critical