First published: Tue Apr 16 2013(Updated: )
It was discovered that the 2D component contained multiple errors within the font layout and font glyph table processing. An untrusted Java application or applet could possibly use these flaws to bypass Java sandbox restrictions. As the provided patch combined fixes for <a href="https://access.redhat.com/security/cve/CVE-2013-2383">CVE-2013-2383</a>, <a href="https://access.redhat.com/security/cve/CVE-2013-2384">CVE-2013-2384</a> and <a href="https://access.redhat.com/security/cve/CVE-2013-1569">CVE-2013-1569</a>, it is currently not possible to match individual issues to their respective CVE identifier.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea6 | <1.11.10 | 1.11.10 |
redhat/icedtea6 | <1.12.5 | 1.12.5 |
redhat/icedtea7 | <2.3.9 | 2.3.9 |
Oracle Java Runtime Environment (JRE) | <=1.7.0 | |
Oracle Java Runtime Environment (JRE) | =1.7.0 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update1 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update10 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update11 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update13 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update15 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update2 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update3 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update4 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update5 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update6 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update7 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update9 | |
Oracle JDK 6 | <=1.7.0 | |
Oracle JDK 6 | =1.7.0 | |
Oracle JDK 6 | =1.7.0-update1 | |
Oracle JDK 6 | =1.7.0-update10 | |
Oracle JDK 6 | =1.7.0-update11 | |
Oracle JDK 6 | =1.7.0-update13 | |
Oracle JDK 6 | =1.7.0-update15 | |
Oracle JDK 6 | =1.7.0-update2 | |
Oracle JDK 6 | =1.7.0-update3 | |
Oracle JDK 6 | =1.7.0-update4 | |
Oracle JDK 6 | =1.7.0-update5 | |
Oracle JDK 6 | =1.7.0-update6 | |
Oracle JDK 6 | =1.7.0-update7 | |
Oracle JDK 6 | =1.7.0-update9 | |
Oracle Java Runtime Environment (JRE) | <=1.6.0 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update22 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update23 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update24 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update25 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update26 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update27 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update29 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update30 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update31 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update32 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update33 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update34 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update35 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update37 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update38 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update39 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update41 | |
Sun JRE | =1.6.0 | |
Sun JRE | =1.6.0-update_1 | |
Sun JRE | =1.6.0-update_10 | |
Sun JRE | =1.6.0-update_11 | |
Sun JRE | =1.6.0-update_12 | |
Sun JRE | =1.6.0-update_13 | |
Sun JRE | =1.6.0-update_14 | |
Sun JRE | =1.6.0-update_15 | |
Sun JRE | =1.6.0-update_16 | |
Sun JRE | =1.6.0-update_17 | |
Sun JRE | =1.6.0-update_18 | |
Sun JRE | =1.6.0-update_19 | |
Sun JRE | =1.6.0-update_2 | |
Sun JRE | =1.6.0-update_20 | |
Sun JRE | =1.6.0-update_21 | |
Sun JRE | =1.6.0-update_3 | |
Sun JRE | =1.6.0-update_4 | |
Sun JRE | =1.6.0-update_5 | |
Sun JRE | =1.6.0-update_6 | |
Sun JRE | =1.6.0-update_7 | |
Sun JRE | =1.6.0-update_9 | |
Oracle JDK 6 | <=1.6.0 | |
Oracle JDK 6 | =1.6.0-update22 | |
Oracle JDK 6 | =1.6.0-update23 | |
Oracle JDK 6 | =1.6.0-update24 | |
Oracle JDK 6 | =1.6.0-update25 | |
Oracle JDK 6 | =1.6.0-update26 | |
Oracle JDK 6 | =1.6.0-update27 | |
Oracle JDK 6 | =1.6.0-update29 | |
Oracle JDK 6 | =1.6.0-update30 | |
Oracle JDK 6 | =1.6.0-update31 | |
Oracle JDK 6 | =1.6.0-update32 | |
Oracle JDK 6 | =1.6.0-update33 | |
Oracle JDK 6 | =1.6.0-update34 | |
Oracle JDK 6 | =1.6.0-update35 | |
Oracle JDK 6 | =1.6.0-update37 | |
Oracle JDK 6 | =1.6.0-update38 | |
Oracle JDK 6 | =1.6.0-update39 | |
Oracle JDK 6 | =1.6.0-update41 | |
OpenJDK | =1.6.0 | |
OpenJDK | =1.6.0-update_10 | |
OpenJDK | =1.6.0-update_11 | |
OpenJDK | =1.6.0-update_12 | |
OpenJDK | =1.6.0-update_13 | |
OpenJDK | =1.6.0-update_14 | |
OpenJDK | =1.6.0-update_15 | |
OpenJDK | =1.6.0-update_16 | |
OpenJDK | =1.6.0-update_17 | |
OpenJDK | =1.6.0-update_18 | |
OpenJDK | =1.6.0-update_19 | |
OpenJDK | =1.6.0-update_20 | |
OpenJDK | =1.6.0-update_21 | |
OpenJDK | =1.6.0-update_3 | |
OpenJDK | =1.6.0-update_4 | |
OpenJDK | =1.6.0-update_5 | |
OpenJDK | =1.6.0-update_6 | |
OpenJDK | =1.6.0-update_7 | |
OpenJDK | =1.6.0-update1 | |
OpenJDK | =1.6.0-update1_b06 | |
OpenJDK | =1.6.0-update2 | |
Oracle Java Runtime Environment (JRE) | <=1.5.0 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update36 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update38 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update40 | |
Sun JRE | =1.5.0 | |
Sun JRE | =1.5.0-update1 | |
Sun JRE | =1.5.0-update10 | |
Sun JRE | =1.5.0-update11 | |
Sun JRE | =1.5.0-update12 | |
Sun JRE | =1.5.0-update13 | |
Sun JRE | =1.5.0-update14 | |
Sun JRE | =1.5.0-update15 | |
Sun JRE | =1.5.0-update16 | |
Sun JRE | =1.5.0-update17 | |
Sun JRE | =1.5.0-update18 | |
Sun JRE | =1.5.0-update19 | |
Sun JRE | =1.5.0-update2 | |
Sun JRE | =1.5.0-update20 | |
Sun JRE | =1.5.0-update21 | |
Sun JRE | =1.5.0-update22 | |
Sun JRE | =1.5.0-update23 | |
Sun JRE | =1.5.0-update24 | |
Sun JRE | =1.5.0-update25 | |
Sun JRE | =1.5.0-update26 | |
Sun JRE | =1.5.0-update27 | |
Sun JRE | =1.5.0-update28 | |
Sun JRE | =1.5.0-update29 | |
Sun JRE | =1.5.0-update3 | |
Sun JRE | =1.5.0-update31 | |
Sun JRE | =1.5.0-update33 | |
Sun JRE | =1.5.0-update4 | |
Sun JRE | =1.5.0-update5 | |
Sun JRE | =1.5.0-update6 | |
Sun JRE | =1.5.0-update7 | |
Sun JRE | =1.5.0-update8 | |
Sun JRE | =1.5.0-update9 | |
Oracle JDK 6 | <=1.5.0 | |
Oracle JDK 6 | =1.5.0-update36 | |
Oracle JDK 6 | =1.5.0-update38 | |
Oracle JDK 6 | =1.5.0-update40 | |
OpenJDK | =1.5.0 | |
OpenJDK | =1.5.0-update1 | |
OpenJDK | =1.5.0-update10 | |
OpenJDK | =1.5.0-update11 | |
OpenJDK | =1.5.0-update11_b03 | |
OpenJDK | =1.5.0-update12 | |
OpenJDK | =1.5.0-update13 | |
OpenJDK | =1.5.0-update14 | |
OpenJDK | =1.5.0-update15 | |
OpenJDK | =1.5.0-update16 | |
OpenJDK | =1.5.0-update17 | |
OpenJDK | =1.5.0-update18 | |
OpenJDK | =1.5.0-update19 | |
OpenJDK | =1.5.0-update2 | |
OpenJDK | =1.5.0-update20 | |
OpenJDK | =1.5.0-update21 | |
OpenJDK | =1.5.0-update22 | |
OpenJDK | =1.5.0-update23 | |
OpenJDK | =1.5.0-update24 | |
OpenJDK | =1.5.0-update25 | |
OpenJDK | =1.5.0-update26 | |
OpenJDK | =1.5.0-update27 | |
OpenJDK | =1.5.0-update28 | |
OpenJDK | =1.5.0-update29 | |
OpenJDK | =1.5.0-update3 | |
OpenJDK | =1.5.0-update31 | |
OpenJDK | =1.5.0-update33 | |
OpenJDK | =1.5.0-update4 | |
OpenJDK | =1.5.0-update5 | |
OpenJDK | =1.5.0-update6 | |
OpenJDK | =1.5.0-update7 | |
OpenJDK | =1.5.0-update7_b03 | |
OpenJDK | =1.5.0-update8 | |
OpenJDK | =1.5.0-update9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2383 is considered a moderate severity vulnerability due to the potential for untrusted Java applications to bypass sandbox restrictions.
To fix CVE-2013-2383, users should upgrade to the latest version of IcedTea6, IcedTea7, or the Oracle JRE/JDK as specified in the relevant security advisories.
CVE-2013-2383 affects several versions of Oracle JRE, Oracle JDK, and IcedTea packages prior to the patches released in 2013.
The impact of CVE-2013-2383 allows an untrusted Java application to execute arbitrary code outside the confines of the Java security sandbox.
A temporary workaround for CVE-2013-2383 is to disable Java in your web browser until the necessary updates can be applied.