CVE-2013-5907 Affecting java-1.6.0-openjdk-src package, versions <1:1.6.0.0-66.1.13.1.62.amzn1


Severity

Recommended
high

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
44.51% (98th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN201803-JAVA160OPENJDKSRC-1671963
  • published27 Sept 2021
  • disclosed15 Jan 2014

Introduced: 15 Jan 2014

CVE-2013-5907  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2018.03 java-1.6.0-openjdk-src to version 1:1.6.0.0-66.1.13.1.62.amzn1 or higher.
This issue was patched in ALAS-2014-283.

NVD Description

Note: Versions mentioned in the description apply only to the upstream java-1.6.0-openjdk-src package and not the java-1.6.0-openjdk-src package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2018.03 relevant fixed versions and status.

Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.

References

CVSS Scores

version 3.1