First published: Mon Oct 14 2013(Updated: )
It was discovered that the JAXWS component of OpenJDK failed to perform security checks properly. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions because of insufficient checks when invoking object methods, or because of insufficient object type checks.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <2.4.3 | 2.4.3 |
redhat/icedtea | <1.11.14 | 1.11.14 |
redhat/icedtea | <1.12.7 | 1.12.7 |
Oracle OpenJDK 1.8.0 | <=1.7.0 | |
Oracle OpenJDK 1.8.0 | =1.7.0 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update1 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update10 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update11 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update13 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update15 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update17 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update2 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update21 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update25 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update3 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update4 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update5 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update6 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update7 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update9 | |
Oracle OpenJDK 1.8.0 | <=1.6.0 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update22 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update23 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update24 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update25 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update26 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update27 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update29 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update30 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update31 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update32 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update33 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update34 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update35 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update37 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update38 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update39 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update41 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update43 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update45 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update51 | |
Java Development Kit (JDK) | =1.6.0 | |
Java Development Kit (JDK) | =1.6.0-update_10 | |
Java Development Kit (JDK) | =1.6.0-update_11 | |
Java Development Kit (JDK) | =1.6.0-update_12 | |
Java Development Kit (JDK) | =1.6.0-update_13 | |
Java Development Kit (JDK) | =1.6.0-update_14 | |
Java Development Kit (JDK) | =1.6.0-update_15 | |
Java Development Kit (JDK) | =1.6.0-update_16 | |
Java Development Kit (JDK) | =1.6.0-update_17 | |
Java Development Kit (JDK) | =1.6.0-update_18 | |
Java Development Kit (JDK) | =1.6.0-update_19 | |
Java Development Kit (JDK) | =1.6.0-update_20 | |
Java Development Kit (JDK) | =1.6.0-update_21 | |
Java Development Kit (JDK) | =1.6.0-update_3 | |
Java Development Kit (JDK) | =1.6.0-update_4 | |
Java Development Kit (JDK) | =1.6.0-update_5 | |
Java Development Kit (JDK) | =1.6.0-update_6 | |
Java Development Kit (JDK) | =1.6.0-update_7 | |
Java Development Kit (JDK) | =1.6.0-update1 | |
Java Development Kit (JDK) | =1.6.0-update1_b06 | |
Java Development Kit (JDK) | =1.6.0-update2 | |
Oracle JRE | <=1.7.0 | |
Oracle JRE | =1.7.0 | |
Oracle JRE | =1.7.0-update1 | |
Oracle JRE | =1.7.0-update10 | |
Oracle JRE | =1.7.0-update11 | |
Oracle JRE | =1.7.0-update13 | |
Oracle JRE | =1.7.0-update15 | |
Oracle JRE | =1.7.0-update17 | |
Oracle JRE | =1.7.0-update2 | |
Oracle JRE | =1.7.0-update21 | |
Oracle JRE | =1.7.0-update25 | |
Oracle JRE | =1.7.0-update3 | |
Oracle JRE | =1.7.0-update4 | |
Oracle JRE | =1.7.0-update5 | |
Oracle JRE | =1.7.0-update6 | |
Oracle JRE | =1.7.0-update7 | |
Oracle JRE | =1.7.0-update9 | |
Oracle JRE | <=1.6.0 | |
Oracle JRE | =1.6.0-update22 | |
Oracle JRE | =1.6.0-update23 | |
Oracle JRE | =1.6.0-update24 | |
Oracle JRE | =1.6.0-update25 | |
Oracle JRE | =1.6.0-update26 | |
Oracle JRE | =1.6.0-update27 | |
Oracle JRE | =1.6.0-update29 | |
Oracle JRE | =1.6.0-update30 | |
Oracle JRE | =1.6.0-update31 | |
Oracle JRE | =1.6.0-update32 | |
Oracle JRE | =1.6.0-update33 | |
Oracle JRE | =1.6.0-update34 | |
Oracle JRE | =1.6.0-update35 | |
Oracle JRE | =1.6.0-update37 | |
Oracle JRE | =1.6.0-update38 | |
Oracle JRE | =1.6.0-update39 | |
Oracle JRE | =1.6.0-update41 | |
Oracle JRE | =1.6.0-update43 | |
Oracle JRE | =1.6.0-update45 | |
Oracle JRE | =1.6.0-update51 | |
Sun Java Runtime Environment (JRE) | =1.6.0 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_1 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_10 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_11 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_12 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_13 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_14 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_15 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_16 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_17 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_18 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_19 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_2 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_20 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_21 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_3 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_4 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_5 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_6 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_7 | |
Sun Java Runtime Environment (JRE) | =1.6.0-update_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5820 has been classified with a medium severity rating due to the potential for untrusted Java applications to bypass security checks.
To fix CVE-2013-5820, you should update OpenJDK to versions 2.4.3 or later for the IcedTea package, or upgrade to the latest versions of Oracle JDK and JRE.
CVE-2013-5820 affects multiple versions of OpenJDK, Oracle JDK, and Oracle JRE including specific updates of IcedTea up to version 2.4.3.
The potential impact of CVE-2013-5820 includes unauthorized access to restricted resources within Java applications due to insufficient sandbox protection.
Yes, CVE-2013-5820 affects various versions of Oracle JDK, particularly 1.6.0 and 1.7.0, up to update 45.