98569 : Oracle Java JGSS Subcomponent Kerberos Implementation KDC Response Handling Remote DoS
Printer | http://osvdb.org/98569 | Email This | Edit Vulnerability

Views This Week Views All Time Added to OSVDB Last Modified Modified (since 2008) Percent Complete
6 344 6 months ago 2 days ago 6 times 100%

Timeline

Disclosure Date
2013-10-15

Description

Oracle Java JDK, JRE, and JRockit contain a flaw in the JGSS subcomponent Kerberos implementation that is triggered when parsing KDC responses. With a specially crafted packet, a remote attacker can trigger an unexpected exception to crash a service using Java.

Classification

Location: Remote / Network Access
Attack Type: Input Manipulation
Impact: Loss of Availability
Solution: Upgrade
Exploit: Exploit Unknown
Disclosure: Vendor Verified, Coordinated Disclosure

Solution

It has been reported that this issue has been fixed. Upgrade to version 1.7.0_45, 1.6.0_65, and 1.5.0_55, or higher, to address this vulnerability.

Products

Oracle Corporation
Java JRE/JDK (Java SE)
7 Update 40
6 Update 60
7 Update 40
6 Update 60
5.0 Update 51
5.0 Update 51
JRockit
R27.7.6
R28.2.8
OpenJDK
7u40
7u45 (not affected)
6u60
IBM Corporation
AIX
5.3
6.1
7.1
WebSphere Application Server
8.5.0.0
8.5.5.1
8.0.0.0
8.0.0.6
7.0.0.0
7.0.0.29
6.1.0.0
6.1.0.45
Rational Team Concert
4.0
4.0.1
4.0.2
4.0.3
4.0.4
4.0.0.1
4.0.0.2
4.0.5
Tivoli Netcool/OMNIbus
7.2.1
7.2.1.15 (not affected)
7.3.0
7.3.0.13 (not affected)
7.3.1
7.3.1.9 (not affected)
7.4.0
7.4.0.3 (not affected)
Tivoli Monitoring
6.2.2
6.2.2 Fix Pack 03
6.2.0 Fix Pack 01
6.2.3
6.2.2 Fix Pack 04
6.2.0 Fix Pack 02
6.2.2 Fix Pack 05
6.2.0 Fix Pack 03
6.2.2 Fix Pack 06
6.2.2 Fix Pack 07
6.3.0 Fix Pack 01
6.2.2 Fix Pack 08
6.2.3 Fix Pack 01
6.2.2 Fix Pack 09
6.3.0
6.2.3 Fix Pack 02
6.2.1 Fix Pack 01
6.2.1 Fix Pack 02
6.2.0
6.2.2 Fix Pack 01
6.2.1 Fix Pack 03
6.2.1
6.2.2 Fix Pack 02
6.2.1 Fix Pack 04
6.3.0 Fix Pack 02
InfoSphere Information Server
9.1
WebSphere Message Broker
7.0
8.0
7.0.0.7 (not affected)
8.0.0.5 (not affected)
Business Process Manager Advanced
7.5.x
8.0.x
8.5.x
WebSphere Lombardi Edition
7.1.x
7.2.0
Rational Requirements Composer
4.0.3
4.0.4
4.0
4.0.0.1
4.0.0.2
4.0.1
4.0.2
4.0.5
Rational Quality Manager
4.0.3
4.0.4
4.0
4.0.0.1
4.0.0.2
4.0.1
4.0.2
4.0.5
InfoSphere Optim Performance Manager
5.2
5.3
5.1.1
5.1.1.1
4.1
5.1
Application Manager For Smart Business
1.2.1
Tivoli Composite Application Manager for Transactions
7.1
7.2
7.3
7.4
WebSphere Real Time
3.0
Integration Bus
9.0
9.0.0.2 (not affected)
SDK, Java Technology Edition
5.0
6.0
7.0
WebSphere Business Services Fabric
6.2.x
7.0.x
WebSphere Business Services Fabric on z/OS
6.2.x
7.0.x
WebSphere Dynamic Process Edition
6.1.2
6.2.x
7.0.0
7.0.1
WebSphere Process Server
6.1.2
6.2.x
7.0.x
WebSphere Process Server on z/OS
6.2.x
7.0.x
WebSphere Process Server Hypervisor Edition for Red Hat Enterprise Linux Server for x86 (32-bit)
7.0.0
WebSphere Process Server Hypervisor Edition for Novell SUSE Linux Enterprise Server for x86 (32-bit)
6.2.x
7.0.x
WebSphere Process Server Hypervisor Edition for Novell SUSE Linux Enterprise Server for System z
6.2.x
7.0.x
Business Process Manager Standard
7.5.x
8.0.x
8.5.x
Business Process Manager Express
7.5.x
8.0.x
8.5.x
IBM i
6.1
7.1
V3R7
V4R1
V4R2
V4R3
V4R4
V5R1
V5R2
V5R3
V5R4
WebSphere Partner Gateway Advanced/Enterprise Edition
6.2
6.2.1
6.2.1.1
6.2.1.2
6.2.1.3
Tivoli Netcool/Webtop
2.2
Endpoint Manager for Remote Control
9.0.0
9.0.1
PowerSC
Unspecified
VIOS
2.2.x
Tivoli Foundations Application Manager
1.2
1.1.1
Hewlett-Packard Development Company, L.P.
HP-UX
B.11.23
B.11.31
B.11.11
B.11.23
Red Hat, Inc.
IcedTea
2.4.2
2.4.3 (not affected)
1.12.6
1.12.7 (not affected)
1.11.13
1.11.14 (not affected)
java-1.6.0-sun
1.6.0.75-1jpp.3.el5_10 (not affected)
1.6.0.75-1jpp.1.el6_5 (not affected)
VMware, Inc.
vCenter Server
5.5
Update Manager
5.5

References

Credit

CVSSv2 Score

CVSSv2 Base Score = 2.6
Source: nvd.nist.gov | Generated: 2013-10-16 | Disagree? | There are 1 more: View All

Access_vector_2 Access_complexity_0 Authentication_2 Confidentiality_impact_0 Integrity_impact_0 Availability_impact_1

Comments

No Comments.

The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

© Copyright 2002 - 2014 Open Sourced Vulnerability Database (OSVDB), All Rights Reserved.
Privacy Statement - Terms of Use