First published: Mon Apr 15 2013(Updated: )
RMI implementation in OpenJDK uses property java.rmi.server.useCodebaseOnly, which controls whether automatic loading of classes from other sources than local CLASSPATH and location specified in the java.rmi.server.codebase property is permitted. This property previously defaulted to false, allowing dynamic class downloading. This could allow an attacker to make RMI server or registry to execute arbitrary untrusted code. It was demonstrated that this can be used in combination with another Java sandbox bypass flaw to execute code in the remote rmiregistry or GlassFish Server: <a href="http://seclists.org/fulldisclosure/2013/Feb/18">http://seclists.org/fulldisclosure/2013/Feb/18</a> <a href="http://www.security-explorations.com/en/SE-2012-01-details.html">http://www.security-explorations.com/en/SE-2012-01-details.html</a> <a href="http://www.security-explorations.com/materials/se-2012-01-rmi.zip">http://www.security-explorations.com/materials/se-2012-01-rmi.zip</a> This update changes the default value of the java.rmi.server.useCodebaseOnly property to true. More details on various RMI properties can be found in: <a href="http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/javarmiproperties.html">http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/javarmiproperties.html</a>
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea6 | <1.11.10 | 1.11.10 |
redhat/icedtea6 | <1.12.5 | 1.12.5 |
redhat/icedtea7 | <2.3.9 | 2.3.9 |
Oracle Java Runtime Environment (JRE) | <=1.7.0 | |
Oracle Java Runtime Environment (JRE) | =1.7.0 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update1 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update10 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update11 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update13 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update15 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update2 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update3 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update4 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update5 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update6 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update7 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update9 | |
Oracle JDK 6 | <=1.7.0 | |
Oracle JDK 6 | =1.7.0 | |
Oracle JDK 6 | =1.7.0-update1 | |
Oracle JDK 6 | =1.7.0-update10 | |
Oracle JDK 6 | =1.7.0-update11 | |
Oracle JDK 6 | =1.7.0-update13 | |
Oracle JDK 6 | =1.7.0-update15 | |
Oracle JDK 6 | =1.7.0-update2 | |
Oracle JDK 6 | =1.7.0-update3 | |
Oracle JDK 6 | =1.7.0-update4 | |
Oracle JDK 6 | =1.7.0-update5 | |
Oracle JDK 6 | =1.7.0-update6 | |
Oracle JDK 6 | =1.7.0-update7 | |
Oracle JDK 6 | =1.7.0-update9 | |
Oracle Java Runtime Environment (JRE) | <=1.6.0 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update22 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update23 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update24 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update25 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update26 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update27 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update29 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update30 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update31 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update32 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update33 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update34 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update35 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update37 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update38 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update39 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update41 | |
Sun JRE | =1.6.0 | |
Sun JRE | =1.6.0-update_1 | |
Sun JRE | =1.6.0-update_10 | |
Sun JRE | =1.6.0-update_11 | |
Sun JRE | =1.6.0-update_12 | |
Sun JRE | =1.6.0-update_13 | |
Sun JRE | =1.6.0-update_14 | |
Sun JRE | =1.6.0-update_15 | |
Sun JRE | =1.6.0-update_16 | |
Sun JRE | =1.6.0-update_17 | |
Sun JRE | =1.6.0-update_18 | |
Sun JRE | =1.6.0-update_19 | |
Sun JRE | =1.6.0-update_2 | |
Sun JRE | =1.6.0-update_20 | |
Sun JRE | =1.6.0-update_21 | |
Sun JRE | =1.6.0-update_3 | |
Sun JRE | =1.6.0-update_4 | |
Sun JRE | =1.6.0-update_5 | |
Sun JRE | =1.6.0-update_6 | |
Sun JRE | =1.6.0-update_7 | |
Sun JRE | =1.6.0-update_9 | |
Oracle JDK 6 | <=1.6.0 | |
Oracle JDK 6 | =1.6.0-update22 | |
Oracle JDK 6 | =1.6.0-update23 | |
Oracle JDK 6 | =1.6.0-update24 | |
Oracle JDK 6 | =1.6.0-update25 | |
Oracle JDK 6 | =1.6.0-update26 | |
Oracle JDK 6 | =1.6.0-update27 | |
Oracle JDK 6 | =1.6.0-update29 | |
Oracle JDK 6 | =1.6.0-update30 | |
Oracle JDK 6 | =1.6.0-update31 | |
Oracle JDK 6 | =1.6.0-update32 | |
Oracle JDK 6 | =1.6.0-update33 | |
Oracle JDK 6 | =1.6.0-update34 | |
Oracle JDK 6 | =1.6.0-update35 | |
Oracle JDK 6 | =1.6.0-update37 | |
Oracle JDK 6 | =1.6.0-update38 | |
Oracle JDK 6 | =1.6.0-update39 | |
Oracle JDK 6 | =1.6.0-update41 | |
OpenJDK | =1.6.0 | |
OpenJDK | =1.6.0-update_10 | |
OpenJDK | =1.6.0-update_11 | |
OpenJDK | =1.6.0-update_12 | |
OpenJDK | =1.6.0-update_13 | |
OpenJDK | =1.6.0-update_14 | |
OpenJDK | =1.6.0-update_15 | |
OpenJDK | =1.6.0-update_16 | |
OpenJDK | =1.6.0-update_17 | |
OpenJDK | =1.6.0-update_18 | |
OpenJDK | =1.6.0-update_19 | |
OpenJDK | =1.6.0-update_20 | |
OpenJDK | =1.6.0-update_21 | |
OpenJDK | =1.6.0-update_3 | |
OpenJDK | =1.6.0-update_4 | |
OpenJDK | =1.6.0-update_5 | |
OpenJDK | =1.6.0-update_6 | |
OpenJDK | =1.6.0-update_7 | |
OpenJDK | =1.6.0-update1 | |
OpenJDK | =1.6.0-update1_b06 | |
OpenJDK | =1.6.0-update2 | |
Oracle Java Runtime Environment (JRE) | <=1.5.0 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update36 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update38 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update40 | |
Sun JRE | =1.5.0 | |
Sun JRE | =1.5.0-update1 | |
Sun JRE | =1.5.0-update10 | |
Sun JRE | =1.5.0-update11 | |
Sun JRE | =1.5.0-update12 | |
Sun JRE | =1.5.0-update13 | |
Sun JRE | =1.5.0-update14 | |
Sun JRE | =1.5.0-update15 | |
Sun JRE | =1.5.0-update16 | |
Sun JRE | =1.5.0-update17 | |
Sun JRE | =1.5.0-update18 | |
Sun JRE | =1.5.0-update19 | |
Sun JRE | =1.5.0-update2 | |
Sun JRE | =1.5.0-update20 | |
Sun JRE | =1.5.0-update21 | |
Sun JRE | =1.5.0-update22 | |
Sun JRE | =1.5.0-update23 | |
Sun JRE | =1.5.0-update24 | |
Sun JRE | =1.5.0-update25 | |
Sun JRE | =1.5.0-update26 | |
Sun JRE | =1.5.0-update27 | |
Sun JRE | =1.5.0-update28 | |
Sun JRE | =1.5.0-update29 | |
Sun JRE | =1.5.0-update3 | |
Sun JRE | =1.5.0-update31 | |
Sun JRE | =1.5.0-update33 | |
Sun JRE | =1.5.0-update4 | |
Sun JRE | =1.5.0-update5 | |
Sun JRE | =1.5.0-update6 | |
Sun JRE | =1.5.0-update7 | |
Sun JRE | =1.5.0-update8 | |
Sun JRE | =1.5.0-update9 | |
Oracle JDK 6 | <=1.5.0 | |
Oracle JDK 6 | =1.5.0-update36 | |
Oracle JDK 6 | =1.5.0-update38 | |
Oracle JDK 6 | =1.5.0-update40 | |
OpenJDK | =1.5.0 | |
OpenJDK | =1.5.0-update1 | |
OpenJDK | =1.5.0-update10 | |
OpenJDK | =1.5.0-update11 | |
OpenJDK | =1.5.0-update11_b03 | |
OpenJDK | =1.5.0-update12 | |
OpenJDK | =1.5.0-update13 | |
OpenJDK | =1.5.0-update14 | |
OpenJDK | =1.5.0-update15 | |
OpenJDK | =1.5.0-update16 | |
OpenJDK | =1.5.0-update17 | |
OpenJDK | =1.5.0-update18 | |
OpenJDK | =1.5.0-update19 | |
OpenJDK | =1.5.0-update2 | |
OpenJDK | =1.5.0-update20 | |
OpenJDK | =1.5.0-update21 | |
OpenJDK | =1.5.0-update22 | |
OpenJDK | =1.5.0-update23 | |
OpenJDK | =1.5.0-update24 | |
OpenJDK | =1.5.0-update25 | |
OpenJDK | =1.5.0-update26 | |
OpenJDK | =1.5.0-update27 | |
OpenJDK | =1.5.0-update28 | |
OpenJDK | =1.5.0-update29 | |
OpenJDK | =1.5.0-update3 | |
OpenJDK | =1.5.0-update31 | |
OpenJDK | =1.5.0-update33 | |
OpenJDK | =1.5.0-update4 | |
OpenJDK | =1.5.0-update5 | |
OpenJDK | =1.5.0-update6 | |
OpenJDK | =1.5.0-update7 | |
OpenJDK | =1.5.0-update7_b03 | |
OpenJDK | =1.5.0-update8 | |
OpenJDK | =1.5.0-update9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-1537 is classified as high due to the risk of unauthorized remote code execution.
To fix CVE-2013-1537, upgrade to the patched versions of OpenJDK or IcedTea listed in the vulnerability report.
CVE-2013-1537 affects various versions of OpenJDK, Oracle JDK, and Oracle JRE, specifically those listed in the vulnerability details.
The impact of CVE-2013-1537 includes the potential for an attacker to execute arbitrary code on the affected system.
A temporary workaround for CVE-2013-1537 is to set the java.rmi.server.useCodebaseOnly property to true to limit codebase locations.