// For flags

CVE-2016-0376

JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix

Severity Score

8.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The com.ibm.rmi.io.SunSerializableFactory class in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) does not properly deserialize classes in an AccessController doPrivileged block, which allows remote attackers to bypass a sandbox protection mechanism and execute arbitrary code as demonstrated by the readValue method of the com.ibm.rmi.io.ValueHandlerPool.ValueHandlerSingleton class, which implements the javax.rmi.CORBA.ValueHandler interface. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-5456.

La clase com.ibm.rmi.io.SunSerializableFactory en IBM SDK, Java Technology Edition 6 en versiones anteriores a SR16 FP25 (6.0.16.25), 6 R1 en versiones anteriores a SR8 FP25 (6.1.8.25), 7 en versiones anteriores a SR9 FP40 (7.0.9.40), 7 R1 en versiones anteriores a SR3 FP40 (7.1.3.40) y 8 en versiones anteriores a SR3 (8.0.3.0) no deserializa correctamente las clases en un bloque AccessController doPrivileged, lo que permite a atacantes remotos eludir un mecanismo de protección sandbox y ejecutar código arbitrario como se demuestra mediante el método readValue de la clase com.ibm.rmi.io.ValueHandlerPool.ValueHandlerSingleton, lo que implementa la interfaz javax.rmi.CORBA.ValueHandler. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2013-5456.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-12-08 CVE Reserved
  • 2016-04-30 CVE Published
  • 2023-07-27 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (24)
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Novell
Search vendor "Novell"
Suse Linux Enterprise Software Development Kit
Search vendor "Novell" for product "Suse Linux Enterprise Software Development Kit"
11.0
Search vendor "Novell" for product "Suse Linux Enterprise Software Development Kit" and version "11.0"
sp4
Affected
Novell
Search vendor "Novell"
Suse Linux Enterprise Software Development Kit
Search vendor "Novell" for product "Suse Linux Enterprise Software Development Kit"
12.0
Search vendor "Novell" for product "Suse Linux Enterprise Software Development Kit" and version "12.0"
-
Affected
Novell
Search vendor "Novell"
Suse Linux Enterprise Software Development Kit
Search vendor "Novell" for product "Suse Linux Enterprise Software Development Kit"
12.0
Search vendor "Novell" for product "Suse Linux Enterprise Software Development Kit" and version "12.0"
sp1
Affected
Novell
Search vendor "Novell"
Suse Linux Enterprise Module For Legacy Software
Search vendor "Novell" for product "Suse Linux Enterprise Module For Legacy Software"
12
Search vendor "Novell" for product "Suse Linux Enterprise Module For Legacy Software" and version "12"
-
Affected
Novell
Search vendor "Novell"
Suse Linux Enterprise Server
Search vendor "Novell" for product "Suse Linux Enterprise Server"
11.0
Search vendor "Novell" for product "Suse Linux Enterprise Server" and version "11.0"
sp2, ltss
Affected
Novell
Search vendor "Novell"
Suse Linux Enterprise Server
Search vendor "Novell" for product "Suse Linux Enterprise Server"
11.0
Search vendor "Novell" for product "Suse Linux Enterprise Server" and version "11.0"
sp3, ltss
Affected
Novell
Search vendor "Novell"
Suse Linux Enterprise Server
Search vendor "Novell" for product "Suse Linux Enterprise Server"
11.0
Search vendor "Novell" for product "Suse Linux Enterprise Server" and version "11.0"
sp4
Affected
Novell
Search vendor "Novell"
Suse Linux Enterprise Server
Search vendor "Novell" for product "Suse Linux Enterprise Server"
12.0
Search vendor "Novell" for product "Suse Linux Enterprise Server" and version "12.0"
-
Affected
Novell
Search vendor "Novell"
Suse Linux Enterprise Server
Search vendor "Novell" for product "Suse Linux Enterprise Server"
12.0
Search vendor "Novell" for product "Suse Linux Enterprise Server" and version "12.0"
sp1
Affected
Novell
Search vendor "Novell"
Suse Manager
Search vendor "Novell" for product "Suse Manager"
2.1
Search vendor "Novell" for product "Suse Manager" and version "2.1"
-
Affected
Novell
Search vendor "Novell"
Suse Manager Proxy
Search vendor "Novell" for product "Suse Manager Proxy"
2.1
Search vendor "Novell" for product "Suse Manager Proxy" and version "2.1"
-
Affected
Novell
Search vendor "Novell"
Suse Openstack Cloud
Search vendor "Novell" for product "Suse Openstack Cloud"
5
Search vendor "Novell" for product "Suse Openstack Cloud" and version "5"
-
Affected
Ibm
Search vendor "Ibm"
Java Sdk
Search vendor "Ibm" for product "Java Sdk"
>= 6.0.0.0 < 6.0.16.25
Search vendor "Ibm" for product "Java Sdk" and version " >= 6.0.0.0 < 6.0.16.25"
technology
Affected
Ibm
Search vendor "Ibm"
Java Sdk
Search vendor "Ibm" for product "Java Sdk"
>= 6.1.0.0 < 6.1.8.25
Search vendor "Ibm" for product "Java Sdk" and version " >= 6.1.0.0 < 6.1.8.25"
technology
Affected
Ibm
Search vendor "Ibm"
Java Sdk
Search vendor "Ibm" for product "Java Sdk"
>= 7.0.0.0 < 7.0.9.40
Search vendor "Ibm" for product "Java Sdk" and version " >= 7.0.0.0 < 7.0.9.40"
technology
Affected
Ibm
Search vendor "Ibm"
Java Sdk
Search vendor "Ibm" for product "Java Sdk"
>= 7.1.0.0 < 7.1.3.40
Search vendor "Ibm" for product "Java Sdk" and version " >= 7.1.0.0 < 7.1.3.40"
technology
Affected
Ibm
Search vendor "Ibm"
Java Sdk
Search vendor "Ibm" for product "Java Sdk"
>= 8.0.0.0 < 8.0.3.0
Search vendor "Ibm" for product "Java Sdk" and version " >= 8.0.0.0 < 8.0.3.0"
technology
Affected
Redhat
Search vendor "Redhat"
Satellite
Search vendor "Redhat" for product "Satellite"
5.6
Search vendor "Redhat" for product "Satellite" and version "5.6"
-
Affected
Redhat
Search vendor "Redhat"
Satellite
Search vendor "Redhat" for product "Satellite"
5.7
Search vendor "Redhat" for product "Satellite" and version "5.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
5.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "5.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
6.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
7.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Hpc Node Supplementary
Search vendor "Redhat" for product "Enterprise Linux Hpc Node Supplementary"
6.0
Search vendor "Redhat" for product "Enterprise Linux Hpc Node Supplementary" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Hpc Node Supplementary
Search vendor "Redhat" for product "Enterprise Linux Hpc Node Supplementary"
7.0
Search vendor "Redhat" for product "Enterprise Linux Hpc Node Supplementary" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server
Search vendor "Redhat" for product "Enterprise Linux Server"
6.0
Search vendor "Redhat" for product "Enterprise Linux Server" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server
Search vendor "Redhat" for product "Enterprise Linux Server"
7.0
Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
6.7
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "6.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.2
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.3
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.3"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.4
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.5
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.5"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation
Search vendor "Redhat" for product "Enterprise Linux Workstation"
5.0
Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "5.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation
Search vendor "Redhat" for product "Enterprise Linux Workstation"
6.0
Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation
Search vendor "Redhat" for product "Enterprise Linux Workstation"
7.0
Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "7.0"
-
Affected