Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Vulnerability Alert

Oracle Java Security Manager Security Bypass Arbitrary Code Execution Vulnerability

 
Threat Type:CWE: Design Error
IntelliShield ID:27845
Version:5
First Published:2013 January 11 16:43 GMT
Last Published:2013 March 13 19:24 GMT
Port: Not available
CVE:CVE-2013-0422
BugTraq ID:57246
Urgency:Possible use
Credibility:Confirmed
Severity:Moderate Damage
CVSS Base:9.3 CVSS Calculator
CVSS Version 2.0
CVSS Temporal:7.7
 
Version Summary:Red Hat has released an additional security advisory and updated packages to address the Oracle Java Security Manager security bypass arbitrary code execution vulnerability.
 
 
Description
Oracle Java version 7 with updates 10 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

The vulnerability is due to improper security protections on functions reserved for privileged access. An unauthenticated, remote attacker could exploit this vulnerability by attempting to persuade a user to follow a link to a malicious site using misleading language or instructions. If successful, the attacker could execute arbitrary code on the system with the privileges of the user.

Functional exploit code exists publicly as part of exploit toolkits and the Metasploit framework.

Oracle has confirmed the vulnerability and software updates are available.
 
Warning Indicators
Oracle Java version 7 with updates 10 and prior are vulnerable. Previous versions of Oracle Java, versions 5 and 6, are not affected.
 
IntelliShield Analysis
To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.

Functional code that exploits the vulnerability is publicly available and actively exploited in the wild. Reports indicate the Blackhole and Nuclear Pack exploit kits have incorporated this vulnerability, which could help an attacker in a successful exploit. Exploit source code has also been posted publicly, further increasing the likelihood of exploitation.

This vulnerability was first documented in IntelliShield Alert 27841.
 
Vendor Announcements
Oracle has released a security alert at the following link: Oracle Security Alert for CVE-2013-0422

Red Hat has released an official CVE statement and security advisories for bug 894172 at the following links: CVE-2013-0422, RHSA-2013:0156, RHSA-2013:0165, and RHSA-2013-0626

US-CERT has released a vulnerability note at the following link: VU#625617
 
Impact
An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code on a targeted system with the privileges of the user. If the user holds elevated privileges, the attacker could completely compromise the system.
 
Technical Information
The vulnerability is due to improper security protections on built-in classes in the Java Runtime Environment. An untrusted, unsigned Java applet can use the setSecurityManager() function to bypass security checks and access an elevated security context, allowing attackers to take actions outside the security protections of the sandbox environment.

An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a website that contains a malicious Java applet. When viewed, the applet could take actions in the user's browser outside the security protections of the Java Runtime Environment sandbox. As a result of bypassing the security protections, the attacker could execute arbitrary code on the system with the privileges of the user.
 
Safeguards
Administrators are advised to apply the appropriate updates.

Users may consider using the previous version of Java, which does not contain the vulnerability.

Users are advised to disable Java content in web browsers through the Java control panel applet.

Administrators may consider disabling Java and the Java plug-in in web browsers. Instructions for disabling Java in web browsers can be found at the following links: Administrators may consider uninstalling Java.
 
Patches/Software
Oracle has released updated software at the following links: Java SE JDK and JRE 7 update 11 and Java SE running JRE 7 with a browser

Red Hat has released updated software for registered subscribers at the following link: Red Hat Network

Red Hat packages can be updated on Red Hat Enterprise Linux versions 5 and later using the yum tool.

Signatures
 
Cisco Intrusion Prevention System (IPS) 6.0
Signature IDSignature NameReleaseLatest Release Date
1804/0Java 1.7 Update 10 Remote Code ExecutionS6882013 Jan 11 
1804/1Java 1.7 Update 10 Remote Code ExecutionS6912013 Jan 24 
1804/2Java 1.7 Update 10 Remote Code ExecutionS6912013 Jan 24 
1804/3Java 1.7 Update 10 Remote Code ExecutionS6912013 Jan 24 
 
Alert History
 

Version 4, January 17, 2013, 7:01 AM: Red Hat has released an additional security advisory and updated packages to address the Oracle Java Security Manager security bypass arbitrary code execution vulnerability.

Version 3, January 15, 2013, 6:31 AM: Red Hat has released a security advisory and updated packages to address the Oracle Java Security Manager security bypass arbitrary code execution vulnerability.

Version 2, January 14, 2013, 4:56 AM: Oracle has released a security alert and updated software to address the Java security manager security bypass arbitrary code execution vulnerability.

Version 1, January 11, 2013, 7:43 AM: Oracle Java contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. Updates are not available.


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
Sun Microsystems, Inc.Java Runtime Environment (JRE) 7.0 Base, Update 1, Update 2, Update 3, Update 4, Update 5, Update 6, Update 7, Update 8, Update 9, Update 10

Associated Products:
Red Hat, Inc.Red Hat Enterprise Linux 5 IA-32, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Desktop 5 IA-32, x86_64 | 6 IA-32, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Desktop Supplementary 5.0 IA-32, x86-64 | 6 IA-32, x86_64
Red Hat, Inc.Red Hat Enterprise Linux HPC Node 6 x86_64
Red Hat, Inc.Red Hat Enterprise Linux HPC Node Supplementary 6 x86_64
Red Hat, Inc.Red Hat Enterprise Linux Server 6 IA-32, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Server Supplementary 6 IA-32, PPC, PPC 64, s390, s390x, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Server Supplementary EUS 6.4.z IA-32, ppc64, s390x, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Workstation 6 IA-32, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Workstation Supplementary 6 IA-32, x86_64
Red Hat, Inc.RHEL Supplementary 5 IA-32, PPC, PPC64, S390, S390x, x86_64




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield