// For flags

CVE-2013-5907

Oracle Java TrueType LookupCount Buffer Overflow Remote Code Execution Vulnerability

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.

Vulnerabilidad no especificada en Oracle Java SE 5.0u55, 6u65 y 7u45; JRockit R27.7.7 y R28.2.9; y Java SE Embedded 7u45 permite a atacantes remotos afectar a la confidencialidad, integridad y disponibilidad a través de vectores desconocidos relacionados con 2D.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of TrueType fonts. The issue lies in the handling of TTF files with an overly large LookupCount. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the process.

*Credits: John Leitch
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-09-18 CVE Reserved
  • 2014-01-15 CVE Published
  • 2024-01-13 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (32)
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.5.0
Search vendor "Oracle" for product "Jdk" and version "1.5.0"
update55
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.5.0
Search vendor "Oracle" for product "Jre" and version "1.5.0"
update55
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.7.0
Search vendor "Oracle" for product "Jdk" and version "1.7.0"
update45
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.7.0
Search vendor "Oracle" for product "Jre" and version "1.7.0"
update45
Affected
Oracle
Search vendor "Oracle"
Jrockit
Search vendor "Oracle" for product "Jrockit"
r27.7.7
Search vendor "Oracle" for product "Jrockit" and version "r27.7.7"
-
Affected
Oracle
Search vendor "Oracle"
Jrockit
Search vendor "Oracle" for product "Jrockit"
r28.2.9
Search vendor "Oracle" for product "Jrockit" and version "r28.2.9"
-
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.6.0
Search vendor "Oracle" for product "Jdk" and version "1.6.0"
update65
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.6.0
Search vendor "Oracle" for product "Jre" and version "1.6.0"
update65
Affected