7.5
Advisory Published
CVE Published
Updated

CVE-2013-2461

First published: Mon Jun 17 2013(Updated: )

It was discovered that the DOMCanonicalizationMethod did not properly verify the canonicalization algorithm. A remote attacker could possibly exploit this flaw to bypass correct XML signature verification.

Credit: secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
Oracle JDK 6=1.6.0-update22
Oracle JDK 6=1.6.0-update23
Oracle JDK 6=1.6.0-update24
Oracle JDK 6=1.6.0-update25
Oracle JDK 6=1.6.0-update26
Oracle JDK 6=1.6.0-update27
Oracle JDK 6=1.6.0-update29
Oracle JDK 6=1.6.0-update30
Oracle JDK 6=1.6.0-update31
Oracle JDK 6=1.6.0-update32
Oracle JDK 6=1.6.0-update33
Oracle JDK 6=1.6.0-update34
Oracle JDK 6=1.6.0-update35
Oracle JDK 6=1.6.0-update37
Oracle JDK 6=1.6.0-update38
Oracle JDK 6=1.6.0-update39
Oracle JDK 6=1.6.0-update41
Oracle JDK 6=1.6.0-update43
OpenJDK=1.6.0
OpenJDK=1.6.0-update_10
OpenJDK=1.6.0-update_11
OpenJDK=1.6.0-update_12
OpenJDK=1.6.0-update_13
OpenJDK=1.6.0-update_14
OpenJDK=1.6.0-update_15
OpenJDK=1.6.0-update_16
OpenJDK=1.6.0-update_17
OpenJDK=1.6.0-update_18
OpenJDK=1.6.0-update_19
OpenJDK=1.6.0-update_20
OpenJDK=1.6.0-update_21
OpenJDK=1.6.0-update_3
OpenJDK=1.6.0-update_4
OpenJDK=1.6.0-update_5
OpenJDK=1.6.0-update_6
OpenJDK=1.6.0-update_7
OpenJDK=1.6.0-update1
OpenJDK=1.6.0-update1_b06
OpenJDK=1.6.0-update2
Oracle Java Runtime Environment (JRE)=1.7.0
Oracle Java Runtime Environment (JRE)=1.7.0-update1
Oracle Java Runtime Environment (JRE)=1.7.0-update10
Oracle Java Runtime Environment (JRE)=1.7.0-update11
Oracle Java Runtime Environment (JRE)=1.7.0-update13
Oracle Java Runtime Environment (JRE)=1.7.0-update15
Oracle Java Runtime Environment (JRE)=1.7.0-update17
Oracle Java Runtime Environment (JRE)=1.7.0-update2
Oracle Java Runtime Environment (JRE)=1.7.0-update3
Oracle Java Runtime Environment (JRE)=1.7.0-update4
Oracle Java Runtime Environment (JRE)=1.7.0-update5
Oracle Java Runtime Environment (JRE)=1.7.0-update6
Oracle Java Runtime Environment (JRE)=1.7.0-update7
Oracle Java Runtime Environment (JRE)=1.7.0-update9
BEA JRockit>=r27.7.1<=r27.7.5
BEA JRockit>=r28.0.0<=r28.2.7
OpenJDK 17=1.7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2013-2461?

    The severity of CVE-2013-2461 is classified as high due to its potential impact on XML signature verification.

  • How do I fix CVE-2013-2461?

    To fix CVE-2013-2461, update your Java Runtime Environment or Oracle JDK to the latest version, which contains the necessary security patches.

  • What versions are affected by CVE-2013-2461?

    CVE-2013-2461 affects Oracle JDK versions 1.6.0-update22 through 1.6.0-update43 and certain Oracle JRE 1.7.0 versions.

  • What is the risk of CVE-2013-2461 for my applications?

    The risk of CVE-2013-2461 is that a remote attacker might exploit it to bypass XML signature verification, potentially compromising data integrity.

  • Is there a workaround for CVE-2013-2461?

    There are no officially documented workarounds for CVE-2013-2461, making an update the recommended action.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203