Exploited
CWE
264 284
Advisory Published
Updated

CVE-2013-0422: Oracle JRE Remote Code Execution Vulnerability

First published: Thu Jan 10 2013(Updated: )

Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.

Credit: secalert_us@oracle.com secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
Sun Java Runtime Environment 5
Oracle JDK 6=1.7.0
Oracle JDK 6=1.7.0-update1
Oracle JDK 6=1.7.0-update10
Oracle JDK 6=1.7.0-update2
Oracle JDK 6=1.7.0-update3
Oracle JDK 6=1.7.0-update4
Oracle JDK 6=1.7.0-update5
Oracle JDK 6=1.7.0-update6
Oracle JDK 6=1.7.0-update7
Oracle JDK 6=1.7.0-update9
Oracle Java Runtime Environment (JRE)=1.7.0
Oracle Java Runtime Environment (JRE)=1.7.0-update1
Oracle Java Runtime Environment (JRE)=1.7.0-update10
Oracle Java Runtime Environment (JRE)=1.7.0-update2
Oracle Java Runtime Environment (JRE)=1.7.0-update3
Oracle Java Runtime Environment (JRE)=1.7.0-update4
Oracle Java Runtime Environment (JRE)=1.7.0-update5
Oracle Java Runtime Environment (JRE)=1.7.0-update6
Oracle Java Runtime Environment (JRE)=1.7.0-update7
Oracle Java Runtime Environment (JRE)=1.7.0-update9
Oracle JDK 6=1.7.0
Oracle Java Runtime Environment (JRE)=1.7.0
Ubuntu=12.10
openSUSE=12.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2013-0422?

    CVE-2013-0422 is classified as a high severity vulnerability that allows remote code execution.

  • How can I fix CVE-2013-0422?

    To fix CVE-2013-0422, you should update to the latest version of Oracle Java 7 or apply the security patches provided by Oracle.

  • Which versions of Java are affected by CVE-2013-0422?

    CVE-2013-0422 affects Oracle Java 7 before Update 11, including versions 1.7.0 through 1.7.0-update10.

  • What types of attacks can be executed due to CVE-2013-0422?

    CVE-2013-0422 allows remote attackers to execute arbitrary code, potentially leading to system compromise.

  • Is CVE-2013-0422 still a threat if I no longer use Java?

    If you have Java installed on your system, CVE-2013-0422 remains a threat until the affected software is removed or updated.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203