First published: Tue Oct 15 2013(Updated: )
A denial of service flaw was discovered in the com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream class. A remote attacker could use this flaw to supply crafted XML that would lead to a denial of service.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.santuario:xmlsec | >=1.5.0<1.5.3 | 1.5.3 |
maven/org.apache.santuario:xmlsec | >=1.4.0<1.4.8 | 1.4.8 |
redhat/icedtea | <2.4.3 | 2.4.3 |
redhat/icedtea | <1.11.14 | 1.11.14 |
redhat/icedtea | <1.12.7 | 1.12.7 |
BEA JRockit | <=r27.7.6 | |
BEA JRockit | =r27.7.1 | |
BEA JRockit | =r27.7.2 | |
BEA JRockit | =r27.7.3 | |
BEA JRockit | =r27.7.4 | |
BEA JRockit | =r27.7.5 | |
Oracle Java Runtime Environment (JRE) | <=1.7.0 | |
Oracle Java Runtime Environment (JRE) | =1.7.0 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update1 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update10 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update11 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update13 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update15 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update17 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update2 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update21 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update25 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update3 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update4 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update5 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update6 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update7 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update9 | |
Oracle JDK 6 | <=1.6.0 | |
Oracle JDK 6 | =1.6.0-update22 | |
Oracle JDK 6 | =1.6.0-update23 | |
Oracle JDK 6 | =1.6.0-update24 | |
Oracle JDK 6 | =1.6.0-update25 | |
Oracle JDK 6 | =1.6.0-update26 | |
Oracle JDK 6 | =1.6.0-update27 | |
Oracle JDK 6 | =1.6.0-update29 | |
Oracle JDK 6 | =1.6.0-update30 | |
Oracle JDK 6 | =1.6.0-update31 | |
Oracle JDK 6 | =1.6.0-update32 | |
Oracle JDK 6 | =1.6.0-update33 | |
Oracle JDK 6 | =1.6.0-update34 | |
Oracle JDK 6 | =1.6.0-update35 | |
Oracle JDK 6 | =1.6.0-update37 | |
Oracle JDK 6 | =1.6.0-update38 | |
Oracle JDK 6 | =1.6.0-update39 | |
Oracle JDK 6 | =1.6.0-update41 | |
Oracle JDK 6 | =1.6.0-update43 | |
Oracle JDK 6 | =1.6.0-update45 | |
Oracle JDK 6 | =1.6.0-update51 | |
OpenJDK | =1.6.0 | |
OpenJDK | =1.6.0-update_10 | |
OpenJDK | =1.6.0-update_11 | |
OpenJDK | =1.6.0-update_12 | |
OpenJDK | =1.6.0-update_13 | |
OpenJDK | =1.6.0-update_14 | |
OpenJDK | =1.6.0-update_15 | |
OpenJDK | =1.6.0-update_16 | |
OpenJDK | =1.6.0-update_17 | |
OpenJDK | =1.6.0-update_18 | |
OpenJDK | =1.6.0-update_19 | |
OpenJDK | =1.6.0-update_20 | |
OpenJDK | =1.6.0-update_21 | |
OpenJDK | =1.6.0-update_3 | |
OpenJDK | =1.6.0-update_4 | |
OpenJDK | =1.6.0-update_5 | |
OpenJDK | =1.6.0-update_6 | |
OpenJDK | =1.6.0-update_7 | |
OpenJDK | =1.6.0-update1 | |
OpenJDK | =1.6.0-update1_b06 | |
OpenJDK | =1.6.0-update2 | |
Oracle JDK 6 | <=1.7.0 | |
Oracle JDK 6 | =1.7.0 | |
Oracle JDK 6 | =1.7.0-update1 | |
Oracle JDK 6 | =1.7.0-update10 | |
Oracle JDK 6 | =1.7.0-update11 | |
Oracle JDK 6 | =1.7.0-update13 | |
Oracle JDK 6 | =1.7.0-update15 | |
Oracle JDK 6 | =1.7.0-update17 | |
Oracle JDK 6 | =1.7.0-update2 | |
Oracle JDK 6 | =1.7.0-update21 | |
Oracle JDK 6 | =1.7.0-update25 | |
Oracle JDK 6 | =1.7.0-update3 | |
Oracle JDK 6 | =1.7.0-update4 | |
Oracle JDK 6 | =1.7.0-update5 | |
Oracle JDK 6 | =1.7.0-update6 | |
Oracle JDK 6 | =1.7.0-update7 | |
Oracle JDK 6 | =1.7.0-update9 | |
BEA JRockit | <=r28.2.8 | |
BEA JRockit | =r28.0.0 | |
BEA JRockit | =r28.0.1 | |
BEA JRockit | =r28.0.2 | |
BEA JRockit | =r28.1.0 | |
BEA JRockit | =r28.1.1 | |
BEA JRockit | =r28.1.3 | |
BEA JRockit | =r28.1.4 | |
BEA JRockit | =r28.1.5 | |
BEA JRockit | =r28.2.2 | |
BEA JRockit | =r28.2.3 | |
BEA JRockit | =r28.2.4 | |
BEA JRockit | =r28.2.5 | |
BEA JRockit | =r28.2.6 | |
Oracle Java Runtime Environment (JRE) | <=1.6.0 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update22 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update23 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update24 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update25 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update26 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update27 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update29 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update30 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update31 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update32 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update33 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update34 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update35 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update37 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update38 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update39 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update41 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update43 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update45 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update51 | |
Sun JRE | =1.6.0 | |
Sun JRE | =1.6.0-update_1 | |
Sun JRE | =1.6.0-update_10 | |
Sun JRE | =1.6.0-update_11 | |
Sun JRE | =1.6.0-update_12 | |
Sun JRE | =1.6.0-update_13 | |
Sun JRE | =1.6.0-update_14 | |
Sun JRE | =1.6.0-update_15 | |
Sun JRE | =1.6.0-update_16 | |
Sun JRE | =1.6.0-update_17 | |
Sun JRE | =1.6.0-update_18 | |
Sun JRE | =1.6.0-update_19 | |
Sun JRE | =1.6.0-update_2 | |
Sun JRE | =1.6.0-update_20 | |
Sun JRE | =1.6.0-update_21 | |
Sun JRE | =1.6.0-update_3 | |
Sun JRE | =1.6.0-update_4 | |
Sun JRE | =1.6.0-update_5 | |
Sun JRE | =1.6.0-update_6 | |
Sun JRE | =1.6.0-update_7 | |
Sun JRE | =1.6.0-update_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5823 has a severity rating that reflects its potential to cause denial of service.
To fix CVE-2013-5823, update the affected packages to the recommended versions: org.apache.santuario:xmlsec to 1.5.3 or 1.4.8, or icedtea to 2.4.3, 1.11.14, or 1.12.7.
CVE-2013-5823 affects versions of org.apache.santuario:xmlsec prior to 1.5.3, as well as specific versions of icedtea and Oracle JDK/JRE.
Yes, CVE-2013-5823 can be exploited by remote attackers via crafted XML to induce a denial of service.
Yes, official patches are available, which involve updating to specific versions of the affected software.