Vulnerability Details : CVE-2013-2035
Potential exploit
Race condition in hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java in HawtJNI before 1.8, when a custom library path is not specified, allows local users to execute arbitrary Java code by overwriting a temporary JAR file with a predictable name in /tmp.
Products affected by CVE-2013-2035
- cpe:2.3:a:redhat:hawtjni:*:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:hawtjni:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:hawtjni:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:hawtjni:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:hawtjni:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:hawtjni:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:hawtjni:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:hawtjni:1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-2035
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-2035
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | AV:L/AC:M/Au:N/C:P/I:P/A:P |
3.4
|
6.4
|
NIST |
CWE ids for CVE-2013-2035
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2035
-
http://secunia.com/advisories/57915
Sign in
-
http://rhn.redhat.com/errata/RHSA-2014-0400.html
RHSA-2014:0400 - Security Advisory - Red Hat Customer Portal
-
http://www.securitytracker.com/id/1029431
JBoss Enterprise Application Platform Bugs Let Local Users Gain Elevated Privileges and Remote Authenticated Users Bypass Security Controls - SecurityTracker
-
https://github.com/jruby/jruby/issues/732
jline2 bundled jansi needs update after fixing security issue · Issue #732 · jruby/jruby · GitHub
-
http://rhn.redhat.com/errata/RHSA-2013-1786.html
RHSA-2013:1786 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2014-0029.html
RHSA-2014:0029 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2013-1029.html
RHSA-2013:1029 - Security Advisory - Red Hat Customer Portal
-
http://secunia.com/advisories/54108
Sign in
-
http://secunia.com/advisories/53415
Sign in
-
https://github.com/jline/jline2/issues/85
HawtJNI vulnerable to CVE-2013-2035 embedded by jline2 · Issue #85 · jline/jline2 · GitHub
-
http://rhn.redhat.com/errata/RHSA-2015-0034.html
RHSA-2015:0034 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2013-1785.html
RHSA-2013:1785 - Security Advisory - Red Hat Customer Portal
-
https://github.com/fusesource/hawtjni/commit/92c266170ce98edc200c656bd034a237098b8aa5
Simplify shared lib extraction. · fusesource/hawtjni@92c2661 · GitHubExploit;Patch
-
http://rhn.redhat.com/errata/RHSA-2014-0245.html
RHSA-2014:0245 - Security Advisory - Red Hat Customer Portal
-
http://www.osvdb.org/93411
404 Not Found
-
http://rhn.redhat.com/errata/RHSA-2013-1784.html
RHSA-2013:1784 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2035
958618 – (CVE-2013-2035) CVE-2013-2035 HawtJNI: predictable temporary file name leading to local arbitrary code execution
-
http://rhn.redhat.com/errata/RHSA-2014-0254.html
RHSA-2014:0254 - Security Advisory - Red Hat Customer Portal
Jump to