CVE-2013-0422

Known Exploited

Description

Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.

Categories

9.8
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 93.65% Top 5%
KEV Since 
Vendor Advisory redhat.com Vendor Advisory mandriva.com Vendor Advisory opensuse.org Vendor Advisory redhat.com Vendor Advisory ubuntu.com Vendor Advisory oracle.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://rhn.redhat.com/errata/RHSA-2013-0156.html third party advisory vendor advisory
http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html third party advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:095 not applicable vendor advisory
http://blog.fuseyism.com/index.php/2013/01/15/security-icedtea-2-1-4-2-2-4-2-3-4-released/ broken link
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00025.html mailing list third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2013-0165.html third party advisory vendor advisory
http://www.kb.cert.org/vuls/id/625617 third party advisory us government resource
http://www.us-cert.gov/cas/techalerts/TA13-010A.html third party advisory us government resource
https://partners.immunityinc.com/idocs/Java%20MBeanInstantiator.findClass%200day%20Analysis.pdf broken link
http://blog.fireeye.com/research/2013/01/happy-new-year-from-new-java-zero-day.html not applicable
https://www-304.ibm.com/connections/blogs/PSIRT/entry/oracle_java_7_security_manager_bypass_vulnerability_cve_2013_04224?lang=en_us not applicable
http://www.ubuntu.com/usn/USN-1693-1 third party advisory vendor advisory
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0018 third party advisory
http://immunityproducts.blogspot.ca/2013/01/confirmed-java-only-fixed-one-of-two.html third party advisory
https://threatpost.com/en_us/blogs/nasty-new-java-zero-day-found-exploit-kits-already-have-it-011013 not applicable
http://seclists.org/bugtraq/2013/Jan/48 third party advisory mailing list
http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html vendor advisory
http://krebsonsecurity.com/2013/01/zero-day-java-exploit-debuts-in-crimeware/ third party advisory
http://labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/ third party advisory broken link

Frequently Asked Questions

What is the severity of CVE-2013-0422?
CVE-2013-0422 has been scored as a critical severity vulnerability.
How to fix CVE-2013-0422?
To fix CVE-2013-0422, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2013-0422 being actively exploited in the wild?
It is confirmed that CVE-2013-0422 is actively exploited. Be extra cautious if you are using vulnerable components. According to its EPSS score, there is a ~94% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.