vendor:
Java
by:
Name Withheld
9,3
CVSS
HIGH
Signed Integer Overflow
190
CWE
Product Name: Java
Affected Version From: Prior to 7u25
Affected Version To: Prior to 7u25
Patch Exists: YES
Related CWE: CVE-2013-2465
CPE: a:oracle:java
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2014-0414/, https://www.rapid7.com/db/vulnerabilities/apple-java-cve-2013-2464/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2013-2465/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2013-2464/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-1455/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2013-2464/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2013-2464/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2013-2465/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2013-2465/, https://www.rapid7.com/db/vulnerabilities/jre-vuln-cve-2013-2465/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-0957/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-0963/, https://www.rapid7.com/db/vulnerabilities/apple-java-cve-2013-2465/, https://www.rapid7.com/db/vulnerabilities/jre-vuln-cve-2013-2464/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-0958/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-1014/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-1059/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-1060/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-1456/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-1081/, https://www.rapid7.com/db/?q=CVE-2013-2465&type=&page=2, https://www.rapid7.com/db/?q=CVE-2013-2465&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2013
Oracle Java BytePackedRaster.verify() Signed Integer Overflow
The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file.
Mitigation:
Oracle released a patch for this vulnerability on 2013/06/18.