Vulnerability Details : CVE-2013-3009
The com.ibm.CORBA.iiop.ClientDelegate class in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 improperly exposes the invoke method of the java.lang.reflect.Method class, which allows remote attackers to call setSecurityManager and bypass a sandbox protection mechanism via vectors related to the AccessController doPrivileged block.
Exploit prediction scoring system (EPSS) score for CVE-2013-3009
Probability of exploitation activity in the next 30 days: 3.22%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-3009
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
References for CVE-2013-3009
-
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
[security-announce] SUSE-SU-2013:1255-1: important: Security update for
-
http://seclists.org/fulldisclosure/2016/Apr/20
Full Disclosure: Re: [SE-2012-01] Broken security fix in IBM Java 7/8
-
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html
[security-announce] SUSE-SU-2013:1264-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
[security-announce] SUSE-SU-2013:1293-1: important: Security update for
-
http://www-01.ibm.com/support/docview.wss?uid=swg1IV44792
IBM IV44792: FIX SECURITY VULNERABILITY CVE-2013-3009
-
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
[security-announce] SUSE-SU-2013:1257-1: important: Security update for
-
http://rhn.redhat.com/errata/RHSA-2013-1060.html
RHSA-2013:1060 - Security Advisory - Red Hat Customer Portal
- http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf
-
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
[security-announce] SUSE-SU-2013:1305-1: important: Security update for
-
http://www-01.ibm.com/support/docview.wss?uid=swg1IX90118
IBM IX90118: FIX SECURITY VULNERABILITY CVE-2013-3009
-
http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013
Security Vulnerabilities - Java SDKVendor Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21642336
IBM Security Bulletin: Multiple vulnerabilities in IBM WebSphere Real TimeVendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1059.html
RHSA-2013:1059 - Security Advisory - Red Hat Customer Portal
-
http://www-01.ibm.com/support/docview.wss?uid=swg21644197
IBM Security Bulletin: Rational Host On-Demand clients affected by vulnerabilities in IBM JREVendor Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg1PM91727
IBM PM91727: FIX SECURITY VULNERABILITY CVE-2013-3009
-
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
[security-announce] SUSE-SU-2013:1263-1: important: Security update for
-
http://www.security-explorations.com/materials/SE-2012-01-IBM-2.pdf
-
http://rhn.redhat.com/errata/RHSA-2013-1081.html
RHSA-2013:1081 - Security Advisory - Red Hat Customer Portal
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/84150
IBM Java CVE-2013-3009 code execution CVE-2013-3009 Vulnerability Report
-
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html
[security-announce] SUSE-SU-2013:1256-1: important: Security update for
-
http://seclists.org/fulldisclosure/2016/Apr/3
Full Disclosure: [SE-2012-01] Broken security fix in IBM Java 7/8
Products affected by CVE-2013-3009
- cpe:2.3:a:ibm:java:1.4.2.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.17:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.16:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.10:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.11:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.12:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.13:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.15:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.14:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:java:1.4.2.13.8:*:*:*:*:*:*:*