CVE Database

CVE-2013-2445

Impact: Moderate
Public: 2013-06-18
Bugzilla: 975124: CVE-2013-2445 OpenJDK: Better handling of memory allocation errors (Hotspot, 7158805)
IAVA: 2013-A-0122

Details

The MITRE CVE dictionary describes this issue as:

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Hotspot. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "handling of memory allocation errors."

Find out more about CVE-2013-2445 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 4.3
Base Metrics: AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector: Network
Access Complexity: Medium
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Oracle Java for Red Hat Enterprise Linux Desktop 5 (java-1.6.0-sun) RHSA-2014:0414 April 17, 2014
Oracle Java for Red Hat Enterprise Linux Desktop 6 (java-1.6.0-sun) RHSA-2014:0414 April 17, 2014
Red Hat Enterprise Linux Server Supplementary (v. 5) (java-1.7.0-oracle) RHSA-2013:0963 June 20, 2013
Red Hat Enterprise Linux Supplementary version 6 (java-1.7.0-oracle) RHSA-2013:0963 June 20, 2013
Red Hat Enterprise Linux version 5 (java-1.6.0-openjdk) RHSA-2013:1014 July 03, 2013
Red Hat Enterprise Linux version 5 (java-1.7.0-openjdk) RHSA-2013:0958 June 20, 2013
Red Hat Enterprise Linux version 6 (java-1.6.0-openjdk) RHSA-2013:1014 July 03, 2013
Red Hat Enterprise Linux version 6 (java-1.7.0-openjdk) RHSA-2013:0957 June 19, 2013

External References

http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.