10 CVE-2013-1493
Buffer Overflow Used by Malware Exploit

The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
https://nvd.nist.gov/vuln/detail/CVE-2013-1493
Categories
CWE-119 : Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. This term has many different meanings to different audiences. From a CWE mapping perspective, this term should be avoided where possible. Some researchers, developers, and tools intend for it to mean "write past the end of a buffer," whereas others use the same term to mean "any read or write outside the boundaries of a buffer, whether before the beginning of the buffer or after the end of the buffer." Others could mean "any action after the end of a buffer, whether it is a read or write." Since the term is commonly used for exploitation and for vulnerabilities, it further confuses things. Some prominent vendors and researchers use the term "buffer overrun," but most people use "buffer overflow." See the alternate term for "buffer overflow" for context. Generally used for techniques that avoid weaknesses related to memory access, such as those identified by CWE-119 and its descendants. However, the term is not formal, and there is likely disagreement between practitioners as to which weaknesses are implicitly covered by the "memory safety" term. This weakness can be detected using dynamic tools and techniques that interact with the software using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The software's operation may slow down, but it should not become unstable, crash, or generate incorrect results. Replace unbounded copy functions with analogous functions that support length arguments, such as strcpy with strncpy. Create these if they are not available. Incorrect URI normalization in application traffic product leads to buffer overflow, as exploited in the wild per CISA KEV. Buffer overflow in Wi-Fi router web interface, as exploited in the wild per CISA KEV. Classic stack-based buffer overflow in media player using a long entry in a playlist Heap-based buffer overflow in media player using a long entry in a playlist large precision value in a format string triggers overflow negative offset value leads to out-of-bounds read malformed inputs cause accesses of uninitialized or previously-deleted objects, leading to memory corruption chain: lack of synchronization leads to memory corruption Chain: machine-learning product can have a heap-basedbuffer overflow (CWE-122) when some integer-oriented bounds arecalculated by using ceiling() and floor() on floating point values(CWE-1339) attacker-controlled array index leads to code execution chain: -1 value from a function call was intended to indicate an error, but is used as an array index instead. chain: incorrect calculations lead to incorrect pointer dereference and memory corruption product accepts crafted messages that lead to a dereference of an arbitrary pointer chain: malformed input causes dereference of uninitialized memory OS kernel trusts userland-supplied length value, allowing reading of sensitive information Chain: integer overflow in securely-coded mail program leads to buffer overflow. In 2005, this was regarded as unrealistic to exploit, but in 2020, it was rediscovered to be easier to exploit due to evolutions of the technology. buffer overflow involving a regular expression with a large number of captures chain: unchecked message size metadata allows integer overflow (CWE-190) leading to buffer overflow (CWE-119).
References
af854a3a-2127-422b-91ae-364da2661108 Exploit
secalert_us@oracle.com Exploit
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:oracle:jre:*:update15:*:*:*:*:*:* | <= 1.7.0 | |
cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:* | ||
Configuration 2 | ||
cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:* | <= 1.5.0 | |
cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:* | ||
Configuration 3 | ||
cpe:2.3:a:oracle:jdk:*:update41:*:*:*:*:*:* | <= 1.6.0 | |
cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:* | ||
Configuration 4 | ||
cpe:2.3:a:oracle:jre:*:update41:*:*:*:*:*:* | <= 1.6.0 | |
cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:* | ||
Configuration 5 | ||
cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:* | <= 1.5.0 | |
cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:* | ||
cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:* | ||
Configuration 6 | ||
cpe:2.3:a:oracle:jdk:*:update15:*:*:*:*:*:* | <= 1.7.0 | |
cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:* |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
24904 | Java CMM - Remote Code Execution (Metasploit) | 2013-03-29 |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
10 | Buffer Overflow via Environment Variables |
High |
100 | Overflow Buffers |
Very High |
123 | Buffer Manipulation |
Very High |
14 | Client-side Injection-induced Buffer Overflow |
High |
24 | Filter Failure through Buffer Overflow |
High |
42 | MIME Conversion |
High |
44 | Overflow Binary Resource File |
Very High |
45 | Buffer Overflow via Symbolic Links |
High |
46 | Overflow Variables and Tags |
High |
47 | Buffer Overflow via Parameter Expansion |
High |
8 | Buffer Overflow in an API Call |
High |
9 | Buffer Overflow in Local Command-Line Utilities |
High |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.