Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 906447 - (CVE-2013-0431) CVE-2013-0431 OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52)
CVE-2013-0431 OpenJDK: JMX Introspector missing package access check (JMX, 80...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20130127,repor...
: Security
Depends On:
Blocks: 906458 906729
  Show dependency treegraph
 
Reported: 2013-01-31 11:27 EST by Jan Lieskovsky
Modified: 2013-03-13 19:13 EDT (History)
9 users (show)

See Also:
Fixed In Version: icedtea7 2.1.5, icedtea7 2.2.5, icedtea7 2.3.6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-03-12 05:21:44 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:0237 normal SHIPPED_LIVE Critical: java-1.7.0-oracle security update 2013-02-04 23:53:02 EST
Red Hat Product Errata RHSA-2013:0247 normal SHIPPED_LIVE Important: java-1.7.0-openjdk security update 2013-02-08 19:24:43 EST
Red Hat Product Errata RHSA-2013:0626 normal SHIPPED_LIVE Critical: java-1.7.0-ibm security update 2013-11-14 19:14:33 EST

  None (edit)
Description Jan Lieskovsky 2013-01-31 11:27:55 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-0431 to the following vulnerability:

Unspecified vulnerability in Oracle Java SE 7 Update 11 (JRE 1.7.0_11-b21) allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors, aka "Issue 52," a different vulnerability than CVE-2013-1490. NOTE: as of 20130130, this vulnerability does not contain any independently-verifiable details, and there is no vendor acknowledgement. A CVE identifier is being assigned because this vulnerability has received significant public attention, and the original researcher has an established history of releasing vulnerability reports that have been fixed by vendors.

References:
[1] http://www.securityfocus.com/archive/1/525387/30/0/threaded
[2] http://seclists.org/fulldisclosure/2013/Jan/142
[3] http://seclists.org/fulldisclosure/2013/Jan/195
[4] http://arstechnica.com/security/2013/01/critical-java-vulnerabilies-confirmed-in-latest-version/
[5] http://blogs.computerworld.com/malware-and-vulnerabilities/21693/yet-another-java-security-flaw-discovered-number-53
[6] http://www.informationweek.com/security/application-security/java-hacker-uncovers-two-flaws-in-latest/240146717
Comment 1 Tomas Hoger 2013-02-01 16:13:11 EST
Fixed now in Oracle Java SE 7 Update 13.

External references:

http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
Comment 2 Tomas Hoger 2013-02-04 11:05:05 EST
Upstream commit, as included in IcedTea7 repositories:

http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/b09c28ff798f
Comment 3 Tomas Hoger 2013-02-04 12:51:29 EST
Additional details from Adam Gowdiak of Security Explorations:

http://seclists.org/fulldisclosure/2013/Feb/12

  [Issue 52]
  Issue 52 relies on the possibility to call no-argument methods
  on arbitrary objects or classes. The vulnerability has its origin
  in com.sun.jmx.mbeanserver.Introspector class which is located
  in the same package as the infamous MBeanInstantiator bug found
  in the wild in early Jan 2013. The flaw stems from insecure call
  to invoke method of java.lang.reflect.Method class:
  
           if (method != null)
                 return method.invoke(obj, new Object[0]);
  
  In our Proof of Concept code we exploit the above implementation
  by making a call to getDeclaredMethods method of java.lang.Class
  class to gain access to methods of restricted classes. This is
  accomplished with the use of the following code sequence:
  
  Introspector.elementFromComplex((Object)clazz,"declaredMethods")
  
  Access to public method objects of arbitrary restricted classes
  is sufficient to achieve a complete Java VM security sandbox
  compromise. We make use of DefiningClassLoader exploit vector
  for that purpose.

Original report:
http://www.security-explorations.com/materials/SE-2012-01-ORACLE-8.pdf
Comment 4 errata-xmlrpc 2013-02-04 18:54:45 EST
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2013:0237 https://rhn.redhat.com/errata/RHSA-2013-0237.html
Comment 6 errata-xmlrpc 2013-02-08 14:26:49 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2013:0247 https://rhn.redhat.com/errata/RHSA-2013-0247.html
Comment 7 Tomas Hoger 2013-02-14 05:20:09 EST
Fixed in upstream IcedTea versions IcedTea7 2.1.5, 2.2.5, and 2.3.6:

http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-February/021905.html
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-February/021876.html

Note that version 2.3.5 was tagged in upstream mercurial including the security fixes, but was not released.  Only 2.3.6 was released, correcting problem introduced by security patches as included in 2.3.5.
Comment 8 errata-xmlrpc 2013-03-11 14:58:11 EDT
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2013:0626 https://rhn.redhat.com/errata/RHSA-2013-0626.html
Comment 9 Tomas Hoger 2013-03-13 19:13:56 EDT
Exploit for this issue is part of Metasploit:

https://github.com/rapid7/metasploit-framework/tree/master/external/source/exploits/cve-2013-0431

Note You need to log in before you can comment on or make changes to this bug.