{
  "threat_severity" : "Low",
  "public_date" : "2013-01-27T00:00:00Z",
  "bugzilla" : {
    "description" : "7: bypass of the security level setting in browser plugin (Deployment, SE-2012-01 Issue 53)",
    "id" : "906449",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=906449"
  },
  "cvss" : {
    "cvss_base_score" : "0.0",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:N/I:N/A:N",
    "status" : "verified"
  },
  "details" : [ "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 10 and Update 11, when running on Windows using Internet Explorer, Firefox, Opera, and Google Chrome, allows remote attackers to bypass the \"Very High\" security level of the Java Control Panel and execute unsigned Java code without prompting the user via unknown vectors, aka \"Issue 53\" and the \"Java Security Slider\" vulnerability." ],
  "affected_release" : [ {
    "product_name" : "Supplementary for Red Hat Enterprise Linux 5",
    "release_date" : "2013-02-04T00:00:00Z",
    "advisory" : "RHSA-2013:0237",
    "cpe" : "cpe:/a:redhat:rhel_extras:5",
    "package" : "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9"
  }, {
    "product_name" : "Supplementary for Red Hat Enterprise Linux 6",
    "release_date" : "2013-02-04T00:00:00Z",
    "advisory" : "RHSA-2013:0237",
    "cpe" : "cpe:/a:redhat:rhel_extras:6",
    "package" : "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "java-1.4.2-ibm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "java-1.5.0-ibm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "java-1.6.0-ibm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "java-1.7.0-ibm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "java-1.7.0-openjdk",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "java-1.5.0-ibm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "java-1.6.0-ibm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "java-1.7.0-ibm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "java-1.7.0-openjdk",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-1489\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-1489\nhttp://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" ],
  "name" : "CVE-2013-1489",
  "csaw" : false
}