漏洞标题
N/A
漏洞描述信息
在Oracle Java 7 Update 11之前,多个漏洞允许远程攻击者执行任意代码,通过(1)使用JmxMBeanServer类的public getMBeanInstantiator方法获取一个私有MBeanInstantiator对象引用,然后使用findClass方法获取任意类引用,以及(2)使用Reflection API以递归的方式绕过java.lang.invoke.MethodHandles.Lookup.checkSecurityManager方法的安全检查,由于 sun.reflect.Reflection.getCallerClass方法无法跳过新Reflection API相关的帧,如Blackhole和 Nuclear Pack在2013年1月在野外被成功利用,与CVE-2012-4681和CVE-2012-3174不同。注意:一些实体将递归的Reflection API问题映射为CVE-2012-3174,但CVE-2012-3174是一个不同的漏洞,2013年1月14日的细节仍然不公开。CVE-2013-0422涵盖JMX/MBean和Reflection API问题。注意:最初报道Java 6也受漏洞影响,但报道者已经撤回这一说法,表示Java 6不可利用,因为相关代码调用方式未绕过安全检查。注意:截至2013年1月14日,一个可靠的第三方声称Oracle Java 7 Update 11中没有修复findClass/MBeanInstantiator向量漏洞。如果仍然存在漏洞情况,则可能需要为未修复问题创建一个独立的CVE标识符。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Oracle Java Runtime Environment 远程代码执行漏洞
漏洞描述信息
Oracle Java Runtime Environment(JRE)是美国甲骨文(Oracle)公司的一个Java运行时环境,是运行Java程序所必须的环境的集合。 Oracle Java 7 Update 10及之前的版本中存在提权漏洞,该漏洞源于Oracle Java允许使用内容结合JMX (Java Management Extensions) MBean组件和sun.org.mozilla.javascript.internal对象调用‘setSecurityManager()’函数。攻击者通
CVSS信息
N/A
漏洞类别
授权问题