Advisory Published
CVE Published
Advisory Published
Updated

CVE-2013-5823

First published: Tue Oct 15 2013(Updated: )

A denial of service flaw was discovered in the com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream class. A remote attacker could use this flaw to supply crafted XML that would lead to a denial of service.

Credit: secalert_us@oracle.com secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
maven/org.apache.santuario:xmlsec>=1.5.0<1.5.3
1.5.3
maven/org.apache.santuario:xmlsec>=1.4.0<1.4.8
1.4.8
redhat/icedtea<2.4.3
2.4.3
redhat/icedtea<1.11.14
1.11.14
redhat/icedtea<1.12.7
1.12.7
BEA JRockit<=r27.7.6
BEA JRockit=r27.7.1
BEA JRockit=r27.7.2
BEA JRockit=r27.7.3
BEA JRockit=r27.7.4
BEA JRockit=r27.7.5
Oracle Java Runtime Environment (JRE)<=1.7.0
Oracle Java Runtime Environment (JRE)=1.7.0
Oracle Java Runtime Environment (JRE)=1.7.0-update1
Oracle Java Runtime Environment (JRE)=1.7.0-update10
Oracle Java Runtime Environment (JRE)=1.7.0-update11
Oracle Java Runtime Environment (JRE)=1.7.0-update13
Oracle Java Runtime Environment (JRE)=1.7.0-update15
Oracle Java Runtime Environment (JRE)=1.7.0-update17
Oracle Java Runtime Environment (JRE)=1.7.0-update2
Oracle Java Runtime Environment (JRE)=1.7.0-update21
Oracle Java Runtime Environment (JRE)=1.7.0-update25
Oracle Java Runtime Environment (JRE)=1.7.0-update3
Oracle Java Runtime Environment (JRE)=1.7.0-update4
Oracle Java Runtime Environment (JRE)=1.7.0-update5
Oracle Java Runtime Environment (JRE)=1.7.0-update6
Oracle Java Runtime Environment (JRE)=1.7.0-update7
Oracle Java Runtime Environment (JRE)=1.7.0-update9
Oracle JDK 6<=1.6.0
Oracle JDK 6=1.6.0-update22
Oracle JDK 6=1.6.0-update23
Oracle JDK 6=1.6.0-update24
Oracle JDK 6=1.6.0-update25
Oracle JDK 6=1.6.0-update26
Oracle JDK 6=1.6.0-update27
Oracle JDK 6=1.6.0-update29
Oracle JDK 6=1.6.0-update30
Oracle JDK 6=1.6.0-update31
Oracle JDK 6=1.6.0-update32
Oracle JDK 6=1.6.0-update33
Oracle JDK 6=1.6.0-update34
Oracle JDK 6=1.6.0-update35
Oracle JDK 6=1.6.0-update37
Oracle JDK 6=1.6.0-update38
Oracle JDK 6=1.6.0-update39
Oracle JDK 6=1.6.0-update41
Oracle JDK 6=1.6.0-update43
Oracle JDK 6=1.6.0-update45
Oracle JDK 6=1.6.0-update51
OpenJDK=1.6.0
OpenJDK=1.6.0-update_10
OpenJDK=1.6.0-update_11
OpenJDK=1.6.0-update_12
OpenJDK=1.6.0-update_13
OpenJDK=1.6.0-update_14
OpenJDK=1.6.0-update_15
OpenJDK=1.6.0-update_16
OpenJDK=1.6.0-update_17
OpenJDK=1.6.0-update_18
OpenJDK=1.6.0-update_19
OpenJDK=1.6.0-update_20
OpenJDK=1.6.0-update_21
OpenJDK=1.6.0-update_3
OpenJDK=1.6.0-update_4
OpenJDK=1.6.0-update_5
OpenJDK=1.6.0-update_6
OpenJDK=1.6.0-update_7
OpenJDK=1.6.0-update1
OpenJDK=1.6.0-update1_b06
OpenJDK=1.6.0-update2
Oracle JDK 6<=1.7.0
Oracle JDK 6=1.7.0
Oracle JDK 6=1.7.0-update1
Oracle JDK 6=1.7.0-update10
Oracle JDK 6=1.7.0-update11
Oracle JDK 6=1.7.0-update13
Oracle JDK 6=1.7.0-update15
Oracle JDK 6=1.7.0-update17
Oracle JDK 6=1.7.0-update2
Oracle JDK 6=1.7.0-update21
Oracle JDK 6=1.7.0-update25
Oracle JDK 6=1.7.0-update3
Oracle JDK 6=1.7.0-update4
Oracle JDK 6=1.7.0-update5
Oracle JDK 6=1.7.0-update6
Oracle JDK 6=1.7.0-update7
Oracle JDK 6=1.7.0-update9
BEA JRockit<=r28.2.8
BEA JRockit=r28.0.0
BEA JRockit=r28.0.1
BEA JRockit=r28.0.2
BEA JRockit=r28.1.0
BEA JRockit=r28.1.1
BEA JRockit=r28.1.3
BEA JRockit=r28.1.4
BEA JRockit=r28.1.5
BEA JRockit=r28.2.2
BEA JRockit=r28.2.3
BEA JRockit=r28.2.4
BEA JRockit=r28.2.5
BEA JRockit=r28.2.6
Oracle Java Runtime Environment (JRE)<=1.6.0
Oracle Java Runtime Environment (JRE)=1.6.0-update22
Oracle Java Runtime Environment (JRE)=1.6.0-update23
Oracle Java Runtime Environment (JRE)=1.6.0-update24
Oracle Java Runtime Environment (JRE)=1.6.0-update25
Oracle Java Runtime Environment (JRE)=1.6.0-update26
Oracle Java Runtime Environment (JRE)=1.6.0-update27
Oracle Java Runtime Environment (JRE)=1.6.0-update29
Oracle Java Runtime Environment (JRE)=1.6.0-update30
Oracle Java Runtime Environment (JRE)=1.6.0-update31
Oracle Java Runtime Environment (JRE)=1.6.0-update32
Oracle Java Runtime Environment (JRE)=1.6.0-update33
Oracle Java Runtime Environment (JRE)=1.6.0-update34
Oracle Java Runtime Environment (JRE)=1.6.0-update35
Oracle Java Runtime Environment (JRE)=1.6.0-update37
Oracle Java Runtime Environment (JRE)=1.6.0-update38
Oracle Java Runtime Environment (JRE)=1.6.0-update39
Oracle Java Runtime Environment (JRE)=1.6.0-update41
Oracle Java Runtime Environment (JRE)=1.6.0-update43
Oracle Java Runtime Environment (JRE)=1.6.0-update45
Oracle Java Runtime Environment (JRE)=1.6.0-update51
Sun JRE=1.6.0
Sun JRE=1.6.0-update_1
Sun JRE=1.6.0-update_10
Sun JRE=1.6.0-update_11
Sun JRE=1.6.0-update_12
Sun JRE=1.6.0-update_13
Sun JRE=1.6.0-update_14
Sun JRE=1.6.0-update_15
Sun JRE=1.6.0-update_16
Sun JRE=1.6.0-update_17
Sun JRE=1.6.0-update_18
Sun JRE=1.6.0-update_19
Sun JRE=1.6.0-update_2
Sun JRE=1.6.0-update_20
Sun JRE=1.6.0-update_21
Sun JRE=1.6.0-update_3
Sun JRE=1.6.0-update_4
Sun JRE=1.6.0-update_5
Sun JRE=1.6.0-update_6
Sun JRE=1.6.0-update_7
Sun JRE=1.6.0-update_9

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2013-5823?

    CVE-2013-5823 has a severity rating that reflects its potential to cause denial of service.

  • How do I fix CVE-2013-5823?

    To fix CVE-2013-5823, update the affected packages to the recommended versions: org.apache.santuario:xmlsec to 1.5.3 or 1.4.8, or icedtea to 2.4.3, 1.11.14, or 1.12.7.

  • Which software versions are affected by CVE-2013-5823?

    CVE-2013-5823 affects versions of org.apache.santuario:xmlsec prior to 1.5.3, as well as specific versions of icedtea and Oracle JDK/JRE.

  • Can CVE-2013-5823 be exploited remotely?

    Yes, CVE-2013-5823 can be exploited by remote attackers via crafted XML to induce a denial of service.

  • Is there an official patch available for CVE-2013-5823?

    Yes, official patches are available, which involve updating to specific versions of the affected software.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203