7.5
Advisory Published
CVE Published
Updated

CVE-2013-2461

First published: Mon Jun 17 2013(Updated: )

It was discovered that the DOMCanonicalizationMethod did not properly verify the canonicalization algorithm. A remote attacker could possibly exploit this flaw to bypass correct XML signature verification.

Credit: secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
Oracle Java SE 7=1.6.0-update22
Oracle Java SE 7=1.6.0-update23
Oracle Java SE 7=1.6.0-update24
Oracle Java SE 7=1.6.0-update25
Oracle Java SE 7=1.6.0-update26
Oracle Java SE 7=1.6.0-update27
Oracle Java SE 7=1.6.0-update29
Oracle Java SE 7=1.6.0-update30
Oracle Java SE 7=1.6.0-update31
Oracle Java SE 7=1.6.0-update32
Oracle Java SE 7=1.6.0-update33
Oracle Java SE 7=1.6.0-update34
Oracle Java SE 7=1.6.0-update35
Oracle Java SE 7=1.6.0-update37
Oracle Java SE 7=1.6.0-update38
Oracle Java SE 7=1.6.0-update39
Oracle Java SE 7=1.6.0-update41
Oracle Java SE 7=1.6.0-update43
Java Development Kit (JDK)=1.6.0
Java Development Kit (JDK)=1.6.0-update_10
Java Development Kit (JDK)=1.6.0-update_11
Java Development Kit (JDK)=1.6.0-update_12
Java Development Kit (JDK)=1.6.0-update_13
Java Development Kit (JDK)=1.6.0-update_14
Java Development Kit (JDK)=1.6.0-update_15
Java Development Kit (JDK)=1.6.0-update_16
Java Development Kit (JDK)=1.6.0-update_17
Java Development Kit (JDK)=1.6.0-update_18
Java Development Kit (JDK)=1.6.0-update_19
Java Development Kit (JDK)=1.6.0-update_20
Java Development Kit (JDK)=1.6.0-update_21
Java Development Kit (JDK)=1.6.0-update_3
Java Development Kit (JDK)=1.6.0-update_4
Java Development Kit (JDK)=1.6.0-update_5
Java Development Kit (JDK)=1.6.0-update_6
Java Development Kit (JDK)=1.6.0-update_7
Java Development Kit (JDK)=1.6.0-update1
Java Development Kit (JDK)=1.6.0-update1_b06
Java Development Kit (JDK)=1.6.0-update2
Oracle JRE=1.7.0
Oracle JRE=1.7.0-update1
Oracle JRE=1.7.0-update10
Oracle JRE=1.7.0-update11
Oracle JRE=1.7.0-update13
Oracle JRE=1.7.0-update15
Oracle JRE=1.7.0-update17
Oracle JRE=1.7.0-update2
Oracle JRE=1.7.0-update3
Oracle JRE=1.7.0-update4
Oracle JRE=1.7.0-update5
Oracle JRE=1.7.0-update6
Oracle JRE=1.7.0-update7
Oracle JRE=1.7.0-update9
Oracle Java SE>=r27.7.1<=r27.7.5
Oracle Java SE>=r28.0.0<=r28.2.7
OpenJDK 8=1.7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2013-2461?

    The severity of CVE-2013-2461 is classified as high due to its potential impact on XML signature verification.

  • How do I fix CVE-2013-2461?

    To fix CVE-2013-2461, update your Java Runtime Environment or Oracle JDK to the latest version, which contains the necessary security patches.

  • What versions are affected by CVE-2013-2461?

    CVE-2013-2461 affects Oracle JDK versions 1.6.0-update22 through 1.6.0-update43 and certain Oracle JRE 1.7.0 versions.

  • What is the risk of CVE-2013-2461 for my applications?

    The risk of CVE-2013-2461 is that a remote attacker might exploit it to bypass XML signature verification, potentially compromising data integrity.

  • Is there a workaround for CVE-2013-2461?

    There are no officially documented workarounds for CVE-2013-2461, making an update the recommended action.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203