Advisory Published
CVE Published
Advisory Published
Updated

CVE-2013-5823

First published: Tue Oct 15 2013(Updated: )

A denial of service flaw was discovered in the com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream class. A remote attacker could use this flaw to supply crafted XML that would lead to a denial of service.

Credit: secalert_us@oracle.com secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
maven/org.apache.santuario:xmlsec>=1.5.0<1.5.3
1.5.3
maven/org.apache.santuario:xmlsec>=1.4.0<1.4.8
1.4.8
redhat/icedtea<2.4.3
2.4.3
redhat/icedtea<1.11.14
1.11.14
redhat/icedtea<1.12.7
1.12.7
Oracle Java SE<=r27.7.6
Oracle Java SE=r27.7.1
Oracle Java SE=r27.7.2
Oracle Java SE=r27.7.3
Oracle Java SE=r27.7.4
Oracle Java SE=r27.7.5
Oracle JRE<=1.7.0
Oracle JRE=1.7.0
Oracle JRE=1.7.0-update1
Oracle JRE=1.7.0-update10
Oracle JRE=1.7.0-update11
Oracle JRE=1.7.0-update13
Oracle JRE=1.7.0-update15
Oracle JRE=1.7.0-update17
Oracle JRE=1.7.0-update2
Oracle JRE=1.7.0-update21
Oracle JRE=1.7.0-update25
Oracle JRE=1.7.0-update3
Oracle JRE=1.7.0-update4
Oracle JRE=1.7.0-update5
Oracle JRE=1.7.0-update6
Oracle JRE=1.7.0-update7
Oracle JRE=1.7.0-update9
Oracle Java SE 7<=1.6.0
Oracle Java SE 7=1.6.0-update22
Oracle Java SE 7=1.6.0-update23
Oracle Java SE 7=1.6.0-update24
Oracle Java SE 7=1.6.0-update25
Oracle Java SE 7=1.6.0-update26
Oracle Java SE 7=1.6.0-update27
Oracle Java SE 7=1.6.0-update29
Oracle Java SE 7=1.6.0-update30
Oracle Java SE 7=1.6.0-update31
Oracle Java SE 7=1.6.0-update32
Oracle Java SE 7=1.6.0-update33
Oracle Java SE 7=1.6.0-update34
Oracle Java SE 7=1.6.0-update35
Oracle Java SE 7=1.6.0-update37
Oracle Java SE 7=1.6.0-update38
Oracle Java SE 7=1.6.0-update39
Oracle Java SE 7=1.6.0-update41
Oracle Java SE 7=1.6.0-update43
Oracle Java SE 7=1.6.0-update45
Oracle Java SE 7=1.6.0-update51
Java Development Kit (JDK)=1.6.0
Java Development Kit (JDK)=1.6.0-update_10
Java Development Kit (JDK)=1.6.0-update_11
Java Development Kit (JDK)=1.6.0-update_12
Java Development Kit (JDK)=1.6.0-update_13
Java Development Kit (JDK)=1.6.0-update_14
Java Development Kit (JDK)=1.6.0-update_15
Java Development Kit (JDK)=1.6.0-update_16
Java Development Kit (JDK)=1.6.0-update_17
Java Development Kit (JDK)=1.6.0-update_18
Java Development Kit (JDK)=1.6.0-update_19
Java Development Kit (JDK)=1.6.0-update_20
Java Development Kit (JDK)=1.6.0-update_21
Java Development Kit (JDK)=1.6.0-update_3
Java Development Kit (JDK)=1.6.0-update_4
Java Development Kit (JDK)=1.6.0-update_5
Java Development Kit (JDK)=1.6.0-update_6
Java Development Kit (JDK)=1.6.0-update_7
Java Development Kit (JDK)=1.6.0-update1
Java Development Kit (JDK)=1.6.0-update1_b06
Java Development Kit (JDK)=1.6.0-update2
Oracle Java SE 7<=1.7.0
Oracle Java SE 7=1.7.0
Oracle Java SE 7=1.7.0-update1
Oracle Java SE 7=1.7.0-update10
Oracle Java SE 7=1.7.0-update11
Oracle Java SE 7=1.7.0-update13
Oracle Java SE 7=1.7.0-update15
Oracle Java SE 7=1.7.0-update17
Oracle Java SE 7=1.7.0-update2
Oracle Java SE 7=1.7.0-update21
Oracle Java SE 7=1.7.0-update25
Oracle Java SE 7=1.7.0-update3
Oracle Java SE 7=1.7.0-update4
Oracle Java SE 7=1.7.0-update5
Oracle Java SE 7=1.7.0-update6
Oracle Java SE 7=1.7.0-update7
Oracle Java SE 7=1.7.0-update9
Oracle Java SE<=r28.2.8
Oracle Java SE=r28.0.0
Oracle Java SE=r28.0.1
Oracle Java SE=r28.0.2
Oracle Java SE=r28.1.0
Oracle Java SE=r28.1.1
Oracle Java SE=r28.1.3
Oracle Java SE=r28.1.4
Oracle Java SE=r28.1.5
Oracle Java SE=r28.2.2
Oracle Java SE=r28.2.3
Oracle Java SE=r28.2.4
Oracle Java SE=r28.2.5
Oracle Java SE=r28.2.6
Oracle JRE<=1.6.0
Oracle JRE=1.6.0-update22
Oracle JRE=1.6.0-update23
Oracle JRE=1.6.0-update24
Oracle JRE=1.6.0-update25
Oracle JRE=1.6.0-update26
Oracle JRE=1.6.0-update27
Oracle JRE=1.6.0-update29
Oracle JRE=1.6.0-update30
Oracle JRE=1.6.0-update31
Oracle JRE=1.6.0-update32
Oracle JRE=1.6.0-update33
Oracle JRE=1.6.0-update34
Oracle JRE=1.6.0-update35
Oracle JRE=1.6.0-update37
Oracle JRE=1.6.0-update38
Oracle JRE=1.6.0-update39
Oracle JRE=1.6.0-update41
Oracle JRE=1.6.0-update43
Oracle JRE=1.6.0-update45
Oracle JRE=1.6.0-update51
Sun Java Runtime Environment (JRE)=1.6.0
Sun Java Runtime Environment (JRE)=1.6.0-update_1
Sun Java Runtime Environment (JRE)=1.6.0-update_10
Sun Java Runtime Environment (JRE)=1.6.0-update_11
Sun Java Runtime Environment (JRE)=1.6.0-update_12
Sun Java Runtime Environment (JRE)=1.6.0-update_13
Sun Java Runtime Environment (JRE)=1.6.0-update_14
Sun Java Runtime Environment (JRE)=1.6.0-update_15
Sun Java Runtime Environment (JRE)=1.6.0-update_16
Sun Java Runtime Environment (JRE)=1.6.0-update_17
Sun Java Runtime Environment (JRE)=1.6.0-update_18
Sun Java Runtime Environment (JRE)=1.6.0-update_19
Sun Java Runtime Environment (JRE)=1.6.0-update_2
Sun Java Runtime Environment (JRE)=1.6.0-update_20
Sun Java Runtime Environment (JRE)=1.6.0-update_21
Sun Java Runtime Environment (JRE)=1.6.0-update_3
Sun Java Runtime Environment (JRE)=1.6.0-update_4
Sun Java Runtime Environment (JRE)=1.6.0-update_5
Sun Java Runtime Environment (JRE)=1.6.0-update_6
Sun Java Runtime Environment (JRE)=1.6.0-update_7
Sun Java Runtime Environment (JRE)=1.6.0-update_9

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2013-5823?

    CVE-2013-5823 has a severity rating that reflects its potential to cause denial of service.

  • How do I fix CVE-2013-5823?

    To fix CVE-2013-5823, update the affected packages to the recommended versions: org.apache.santuario:xmlsec to 1.5.3 or 1.4.8, or icedtea to 2.4.3, 1.11.14, or 1.12.7.

  • Which software versions are affected by CVE-2013-5823?

    CVE-2013-5823 affects versions of org.apache.santuario:xmlsec prior to 1.5.3, as well as specific versions of icedtea and Oracle JDK/JRE.

  • Can CVE-2013-5823 be exploited remotely?

    Yes, CVE-2013-5823 can be exploited by remote attackers via crafted XML to induce a denial of service.

  • Is there an official patch available for CVE-2013-5823?

    Yes, official patches are available, which involve updating to specific versions of the affected software.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203