First published: Fri Mar 08 2013(Updated: )
The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea6 | <1.11.10 | 1.11.10 |
redhat/icedtea6 | <1.12.5 | 1.12.5 |
redhat/icedtea7 | <2.3.9 | 2.3.9 |
Oracle Java SE 7 | =1.7.0-update17 | |
Oracle JRE | =1.7.0-update17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0401 is classified as a critical vulnerability allowing remote code execution.
To fix CVE-2013-0401, users should upgrade to Oracle JDK 1.7.0 Update 21 or later, or the recommended versions of IcedTea packages.
CVE-2013-0401 affects Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier, as well as OpenJDK 6 and 7.
While CVE-2013-0401 is an older vulnerability, systems still running affected versions remain vulnerable to exploitation.
CVE-2013-0401 allows attackers to execute arbitrary code on affected systems through remote exploitation methods related to AWT.