First published: Mon Oct 14 2013(Updated: )
It was discovered that jhat (Java Heap Analysis Tool) failed to properly escape all data embedded into HTML pages it generates. A specially crafted content in the memory of a Java program analyzed using jhat could possibly be used to conduct a Cross-Site Scripting attacks against users view jhat generated pages.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.3 | 2.4.3 |
redhat/icedtea | <1.11.14 | 1.11.14 |
redhat/icedtea | <1.12.7 | 1.12.7 |
Oracle Java Runtime Environment (JRE) | <=1.6.0 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update22 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update23 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update24 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update25 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update26 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update27 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update29 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update30 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update31 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update32 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update33 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update34 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update35 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update37 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update38 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update39 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update41 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update43 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update45 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update51 | |
Sun JRE | =1.6.0 | |
Sun JRE | =1.6.0-update_1 | |
Sun JRE | =1.6.0-update_10 | |
Sun JRE | =1.6.0-update_11 | |
Sun JRE | =1.6.0-update_12 | |
Sun JRE | =1.6.0-update_13 | |
Sun JRE | =1.6.0-update_14 | |
Sun JRE | =1.6.0-update_15 | |
Sun JRE | =1.6.0-update_16 | |
Sun JRE | =1.6.0-update_17 | |
Sun JRE | =1.6.0-update_18 | |
Sun JRE | =1.6.0-update_19 | |
Sun JRE | =1.6.0-update_2 | |
Sun JRE | =1.6.0-update_20 | |
Sun JRE | =1.6.0-update_21 | |
Sun JRE | =1.6.0-update_3 | |
Sun JRE | =1.6.0-update_4 | |
Sun JRE | =1.6.0-update_5 | |
Sun JRE | =1.6.0-update_6 | |
Sun JRE | =1.6.0-update_7 | |
Sun JRE | =1.6.0-update_9 | |
Oracle JDK 6 | <=1.6.0 | |
Oracle JDK 6 | =1.6.0-update22 | |
Oracle JDK 6 | =1.6.0-update23 | |
Oracle JDK 6 | =1.6.0-update24 | |
Oracle JDK 6 | =1.6.0-update25 | |
Oracle JDK 6 | =1.6.0-update26 | |
Oracle JDK 6 | =1.6.0-update27 | |
Oracle JDK 6 | =1.6.0-update29 | |
Oracle JDK 6 | =1.6.0-update30 | |
Oracle JDK 6 | =1.6.0-update31 | |
Oracle JDK 6 | =1.6.0-update32 | |
Oracle JDK 6 | =1.6.0-update33 | |
Oracle JDK 6 | =1.6.0-update34 | |
Oracle JDK 6 | =1.6.0-update35 | |
Oracle JDK 6 | =1.6.0-update37 | |
Oracle JDK 6 | =1.6.0-update38 | |
Oracle JDK 6 | =1.6.0-update39 | |
Oracle JDK 6 | =1.6.0-update41 | |
Oracle JDK 6 | =1.6.0-update43 | |
Oracle JDK 6 | =1.6.0-update45 | |
Oracle JDK 6 | =1.6.0-update51 | |
Sun JDK | =1.6.0 | |
Sun JDK | =1.6.0-update_10 | |
Sun JDK | =1.6.0-update_11 | |
Sun JDK | =1.6.0-update_12 | |
Sun JDK | =1.6.0-update_13 | |
Sun JDK | =1.6.0-update_14 | |
Sun JDK | =1.6.0-update_15 | |
Sun JDK | =1.6.0-update_16 | |
Sun JDK | =1.6.0-update_17 | |
Sun JDK | =1.6.0-update_18 | |
Sun JDK | =1.6.0-update_19 | |
Sun JDK | =1.6.0-update_20 | |
Sun JDK | =1.6.0-update_21 | |
Sun JDK | =1.6.0-update_3 | |
Sun JDK | =1.6.0-update_4 | |
Sun JDK | =1.6.0-update_5 | |
Sun JDK | =1.6.0-update_6 | |
Sun JDK | =1.6.0-update_7 | |
Sun JDK | =1.6.0-update1 | |
Sun JDK | =1.6.0-update1_b06 | |
Sun JDK | =1.6.0-update2 | |
Oracle Java Runtime Environment (JRE) | <=1.7.0 | |
Oracle Java Runtime Environment (JRE) | =1.7.0 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update1 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update10 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update11 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update13 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update15 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update17 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update2 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update21 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update25 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update3 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update4 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update5 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update6 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update7 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update9 | |
Oracle JDK 6 | <=1.7.0 | |
Oracle JDK 6 | =1.7.0 | |
Oracle JDK 6 | =1.7.0-update1 | |
Oracle JDK 6 | =1.7.0-update10 | |
Oracle JDK 6 | =1.7.0-update11 | |
Oracle JDK 6 | =1.7.0-update13 | |
Oracle JDK 6 | =1.7.0-update15 | |
Oracle JDK 6 | =1.7.0-update17 | |
Oracle JDK 6 | =1.7.0-update2 | |
Oracle JDK 6 | =1.7.0-update21 | |
Oracle JDK 6 | =1.7.0-update25 | |
Oracle JDK 6 | =1.7.0-update3 | |
Oracle JDK 6 | =1.7.0-update4 | |
Oracle JDK 6 | =1.7.0-update5 | |
Oracle JDK 6 | =1.7.0-update6 | |
Oracle JDK 6 | =1.7.0-update7 | |
Oracle JDK 6 | =1.7.0-update9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5772 is considered a moderate severity vulnerability due to its potential for Cross-Site Scripting (XSS) attacks.
To fix CVE-2013-5772, update to the versions 2.4.3 of IcedTea or 1.11.14 and 1.12.7 of IcedTea, as well as ensuring all Java environments are updated to the latest versions.
CVE-2013-5772 affects various versions of Oracle JDK and JRE, along with IcedTea packages prior to the specified remedied versions.
CVE-2013-5772 can facilitate Cross-Site Scripting (XSS) attacks by allowing an attacker to inject malicious scripts into web pages viewed by users.
Best practices include regularly updating software to the latest versions, implementing input validation, and using Content Security Policy (CSP) to limit script execution.