Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2013-2470Oracle JDK vulnerability

9 documents7 sources
Severity
10.0CRITICALNVD
EPSS
54.4%
top 1.97%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 18
Latest updateMay 14

Description

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors relate

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages4 packages

NVDoracle/jdk1.7.0+5
NVDoracle/jre1.7.0+5
NVDsun/jdk1.5.0, 1.6.0+1
NVDsun/jre1.5.0, 1.6.0+1

🔴Vulnerability Details

2
GHSA
GHSA-x8gh-hfwx-cvcw: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 52022-05-14
CVEList
CVE-2013-2470: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 52013-06-18

💥Exploits & PoCs

1
Exploit-DB
Oracle Java lookUpByteBI - Heap Buffer Overflow2013-09-03

📋Vendor Advisories

4
Ubuntu
OpenJDK 6 vulnerabilities2013-07-23
Ubuntu
OpenJDK 7 vulnerabilities2013-07-16
Red Hat
OpenJDK: ImagingLib byte lookup processing (2D, 8011243)2013-06-18
Red Hat
JDK: unspecified vulnerability fixed in 7u25 (2D)2013-06-18

💬Community

1
Bugzilla
CVE-2013-2470 OpenJDK: ImagingLib byte lookup processing (2D, 8011243)2013-06-17