Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Oracle Java Multiple Vulnerabilities

-

Release Date:  2013-10-16    Last Update:  2014-01-27    Views:  21,961

Secunia Advisory SA55315

Where:

From remote

Impact:

Manipulation of data, Exposure of sensitive information, DoS, System access

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious users to manipulate certain data and by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

1) An unspecified error within the 2D component of the client and server deployment can be exploited to potentially execute arbitrary code.

2) An error when handling LDAP deserialization can be exploited to disable the sandbox and execute arbitrary code by using a custom LDAP server to create objects in restricted packages.

3) An unspecified error within the 2D component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

4) An error related to the javax.imageio.stream.FileImageInputStream class can be exploited to disable the security manager and execute arbitrary code via untrusted Java Web Start applications and untrusted Java applets.

5) An unspecified error within the CORBA component of the cli11ent deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

6) An unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

7) Another unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

8) Another unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

9) Another unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

10) An error within the com.sun.jndi.ldap.LdapCtx class can be exploited to execute arbitrary code by calling the "toString()" method of an object.

11) A race condition error when handling Object serialisation and deserialisation within the e.g. java.io.ObjectOutputStream class can be exploited to read and write arbitrary memory and subsequently e.g. disable the security manager and execute arbitrary code.

12) An unspecified error within the 2D component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

13) An unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

14) An unspecified error within the Libraries component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

15) Another unspecified error within the Libraries component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

16) An unspecified error within the Swing component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

17) Another unspecified error within the Swing component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

18) An unspecified error within the JavaFX component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

19) Another unspecified error within the JavaFX component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

20) Another unspecified error within the JavaFX component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

21) Another unspecified error within the JavaFX component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to potentially execute arbitrary code.

22) An unspecified error within the Deployment component of the client deployment installation process can be exploited to potentially execute arbitrary code.

23) An unspecified error within the JAXP component of the client and server deployment can be exploited to read, update, insert, or delete some Java accessible data and cause a partial DoS.

24) An unspecified error within the JavaFX component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read, update, insert, or delete some Java accessible data and cause a partial DoS.

25) An unspecified error within the Javadoc component in the context of sites running the Javadoc tool as a service and hosting the resulting documentation can be exploited read, update, insert, or delete some Java accessible data.

26) An unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read a subset of some Java accessible data and cause a partial DoS.

27) An unspecified error within the Libraries component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read, update, insert, or delete some Java accessible data.

28) An error related to the javax.swing.text.NumberFormatter and RealTimeSequencer.RealTimeSequencer classes can be exploited to disable the security manager and execute arbitrary code via untrusted Java Web Start applications and untrusted Java applets.

29) An unspecified error within the JAXP component of the client and server deployment can be exploited to cause a partial DoS.

30) Another unspecified error within the JAXP component of the client and server deployment can be exploited to cause a partial DoS.

31) An unspecified error within the Security component of the client and server deployment can be exploited to cause a partial DoS.

32) An unspecified error within the 2D component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read a subset of Java accessible data.

33) Another unspecified error within the 2D component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read a subset of Java accessible data.

34) An unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to update, insert, or delete some Java accessible data.

35) Another unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to update, insert, or delete some Java accessible data.

36) Another unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to update, insert, or delete some Java accessible data.

37) Another unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to update, insert, or delete some Java accessible data.

38) An unspecified error within the JAX-WS component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to update, insert, or delete some Java accessible data.

39) An unspecified error within the JAXP component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read a subset of Java accessible data.

40) An unspecified error within the Libraries component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read a subset of Java accessible data.

41) An unspecified error within the Libraries component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to update, insert, or delete some Java accessible data.

42) An unspecified error within the Deployment component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to update, insert, or delete some Java accessible data.

43) An unspecified error within the Libraries component of the client and server deployment can be exploited to read a subset of Java accessible data.

44) An unspecified error within the JGSS component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read a subset of Java accessible data.

45) An unspecified error within the AWT component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read a subset of Java accessible data.

46) An unspecified error within the BEANS component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read a subset of Java accessible data.

47) An unspecified error within the SCRIPTING component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to update, insert, or delete some Java accessible data.

48) An unspecified error within the Javadoc component in the context of sites running the Javadoc tool as a service and hosting the resulting documentation can be exploited by authenticated users to update, insert, or delete some Java accessible data.

49) An unspecified error within the jhat component of the jhat developer tool can be exploited to update, insert, or delete some Java accessible data.

50) An unspecified error within the JGSS component of the client and server deployment can be exploited to cause a partial DoS.

51) An unspecified error within the JavaFX component of the client deployment can be exploited via untrusted Java Web Start applications and untrusted Java applets to read access a subset of Java accessible data.

The vulnerabilities are reported in the following products:
* JDK and JRE 7 Update 40 and prior
* JDK and JRE 6 Update 60 and prior
* JDK and JRE 5 Update 51 and prior


Solution:
Apply updates.

Further details available to Secunia VIM customers

Provided and/or discovered by:
2, 4, 10, 28) Ben Murphy via ZDI.
11) Independently reported by Ben Murphy via ZDI and Yuki Chen, Trend Micro.

It is currently unclear who reported the other vulnerabilities as the Oracle Critical Patch Update for October 2013 only provides a bundled list of credits. This section will be updated when/if the original reporters provide more information.

Original Advisory:
Oracle:
http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/cpuoct2013verbose-1899842.html#JAVA

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-13-244/
http://www.zerodayinitiative.com/advisories/ZDI-13-245/
http://www.zerodayinitiative.com/advisories/ZDI-13-246/
http://www.zerodayinitiative.com/advisories/ZDI-13-247/
http://www.zerodayinitiative.com/advisories/ZDI-13-248/

Yuki Chen:
http://blog.sina.com.cn/s/blog_6fc131560101ddns.html

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Oracle Java Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability