CVE-2013-4002 (CNNVD-201307-487)

HIGH
中文标题:
Apache Xerces 安全漏洞
英文标题:
XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment...
CVSS分数: 7.1
发布时间: 2013-07-23 10:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Xerces是一个由Apache组织所推动的一项XML文档解析开源项目。 Apache Xerces 5.0 SR16-FP3之前的5.0版本,6 SR14之前的6版本,6.0.1 SR6之前的6.0.1版本,7 SR5之前的7版本中的Java Runtime Environment (JRE)中存在安全漏洞。远程攻击者可利用该漏洞影响可用性。

英文描述:

XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
ibm java 5.0.0.0 - - cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*
ibm java 5.0.11.0 - - cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*
ibm java 5.0.11.1 - - cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*
ibm java 5.0.11.2 - - cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*
ibm java 5.0.12.0 - - cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*
ibm java 5.0.12.1 - - cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*
ibm java 5.0.12.2 - - cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*
ibm java 5.0.12.3 - - cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*
ibm java 5.0.12.4 - - cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*
ibm java 5.0.12.5 - - cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*
ibm java 5.0.13.0 - - cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*
ibm java 5.0.14.0 - - cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*
ibm java 5.0.15.0 - - cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*
ibm java 5.0.16.0 - - cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*
ibm java 5.0.16.1 - - cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*
ibm java 5.0.16.2 - - cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*
ibm java 6.0.0.0 - - cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*
ibm java 6.0.1.0 - - cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*
ibm java 6.0.2.0 - - cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*
ibm java 6.0.3.0 - - cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*
ibm java 6.0.4.0 - - cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*
ibm java 6.0.5.0 - - cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*
ibm java 6.0.6.0 - - cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*
ibm java 6.0.7.0 - - cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*
ibm java 6.0.8.0 - - cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*
ibm java 6.0.8.1 - - cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*
ibm java 6.0.9.0 - - cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*
ibm java 6.0.9.1 - - cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*
ibm java 6.0.9.2 - - cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*
ibm java 6.0.10.0 - - cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*
ibm java 6.0.10.1 - - cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*
ibm java 6.0.11.0 - - cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*
ibm java 6.0.12.0 - - cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*
ibm java 6.0.13.0 - - cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*
ibm java 6.0.13.1 - - cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*
ibm java 6.0.13.2 - - cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*
ibm java 7.0.0.0 - - cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*
ibm java 7.0.1.0 - - cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*
ibm java 7.0.2.0 - - cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*
ibm java 7.0.3.0 - - cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*
ibm java 7.0.4.0 - - cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*
ibm java 7.0.4.1 - - cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*
ibm java 7.0.4.2 - - cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*
oracle jdk 1.5.0 - - cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*
oracle jdk 1.6.0 - - cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*
oracle jdk 1.7.0 - - cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*
oracle jre 1.5.0 - - cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*
oracle jre 1.6.0 - - cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*
oracle jre 1.7.0 - - cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*
oracle jrockit * - - cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*
ibm sterling_b2b_integrator 5.2.4 - - cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*
ibm host_on-demand 11.0 - - cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*
ibm host_on-demand 11.0.1 - - cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*
ibm host_on-demand 11.0.2 - - cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*
ibm host_on-demand 11.0.3 - - cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*
ibm host_on-demand 11.0.4 - - cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*
ibm host_on-demand 11.0.5 - - cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*
ibm host_on-demand 11.0.5.1 - - cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*
ibm host_on-demand 11.0.6 - - cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*
ibm host_on-demand 11.0.6.1 - - cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*
ibm host_on-demand 11.0.7 - - cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*
ibm host_on-demand 11.0.8 - - cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*
ibm tivoli_application_dependency_discovery_manager 7.2.2 - - cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*
ibm sterling_b2b_integrator 5.1 - - cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*
ibm sterling_b2b_integrator 5.2 - - cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*
ibm sterling_file_gateway 2.1 - - cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*
ibm sterling_file_gateway 2.2 - - cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*
opensuse opensuse 12.2 - - cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
opensuse opensuse 12.3 - - cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
suse linux_enterprise_desktop 10 - - cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
suse linux_enterprise_desktop 11 - - cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
suse linux_enterprise_java 10 - - cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*
suse linux_enterprise_java 11 - - cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*
suse linux_enterprise_sdk 11 - - cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*
suse linux_enterprise_server 9 - - cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
suse linux_enterprise_server 10 - - cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
suse linux_enterprise_server 11 - - cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
canonical ubuntu_linux 10.04 - - cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
canonical ubuntu_linux 12.04 - - cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
canonical ubuntu_linux 12.10 - - cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
canonical ubuntu_linux 13.04 - - cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
canonical ubuntu_linux 13.10 - - cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
apache xerces2_java * - - cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
IC98015 vendor-advisory
cve.org
访问
RHSA-2013:1060 vendor-advisory
cve.org
访问
RHSA-2014:0414 vendor-advisory
cve.org
访问
GLSA-201406-32 vendor-advisory
cve.org
访问
RHSA-2013:1447 vendor-advisory
cve.org
访问
RHSA-2015:0765 vendor-advisory
cve.org
访问
RHSA-2013:1440 vendor-advisory
cve.org
访问
RHSA-2015:0675 vendor-advisory
cve.org
访问
61310 vdb-entry
cve.org
访问
RHSA-2015:0773 vendor-advisory
cve.org
访问
RHSA-2015:0720 vendor-advisory
cve.org
访问
SUSE-SU-2013:1257 vendor-advisory
cve.org
访问
USN-2033-1 vendor-advisory
cve.org
访问
USN-2089-1 vendor-advisory
cve.org
访问
SUSE-SU-2013:1256 vendor-advisory
cve.org
访问
HPSBUX02944 vendor-advisory
cve.org
访问
RHSA-2013:1505 vendor-advisory
cve.org
访问
HPSBUX02943 vendor-advisory
cve.org
访问
RHSA-2014:1822 vendor-advisory
cve.org
访问
56257 third-party-advisory
cve.org
访问
SUSE-SU-2013:1263 vendor-advisory
cve.org
访问
RHSA-2013:1059 vendor-advisory
cve.org
访问
RHSA-2014:1823 vendor-advisory
cve.org
访问
openSUSE-SU-2013:1663 vendor-advisory
cve.org
访问
SUSE-SU-2013:1666 vendor-advisory
cve.org
访问
APPLE-SA-2013-10-15-1 vendor-advisory
cve.org
访问
SUSE-SU-2013:1293 vendor-advisory
cve.org
访问
RHSA-2013:1081 vendor-advisory
cve.org
访问
[j-users] 20180503 [ANNOUNCEMENT]: Apache Xerces-J 2.12.0 now available mailing-list
cve.org
访问
SUSE-SU-2013:1255 vendor-advisory
cve.org
访问
RHSA-2013:1451 vendor-advisory
cve.org
访问
RHSA-2014:1818 vendor-advisory
cve.org
访问
RHSA-2014:1821 vendor-advisory
cve.org
访问
SUSE-SU-2013:1305 vendor-advisory
cve.org
访问
ibm-java-cve20134002-dos(85260) vdb-entry
cve.org
访问
[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report mailing-list
cve.org
访问
[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1 mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
CVSS评分详情
7.1
HIGH
CVSS向量: AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS版本: 2.0
机密性
NONE
完整性
NONE
可用性
COMPLETE
时间信息
发布时间:
2013-07-23 10:00:00
修改时间:
2024-08-06 16:30:49
创建时间:
2025-11-11 15:33:36
更新时间:
2025-11-11 15:50:50
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2013-4002 2025-11-11 15:18:37 2025-11-11 07:33:36
NVD nvd_CVE-2013-4002 2025-11-11 14:54:15 2025-11-11 07:42:23
CNNVD cnnvd_CNNVD-201307-487 2025-11-11 15:09:22 2025-11-11 07:50:50
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:50:50
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-201307-487; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-201307-487
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:23
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.1; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:N/I:N/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 83; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.1
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:N/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 83
  • data_sources: ['cve'] -> ['cve', 'nvd']