Vulnerabilities > CVE-2011-3545

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
oracle
sun
nessus

Summary

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.

Vulnerable Configurations

Part Description Count
Application
Oracle
18
Application
Sun
407

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_JAVA-1_6_0-SUN-111024.NASL
    descriptionOracle/Sun Java 1.6.0 was updated to the u26 release, fixing lots of bugs and security issues. Please see http://www.oracle.com/technetwork/topics/security/javacpuoct2011-44343 1.html for more details.
    last seen2020-06-01
    modified2020-06-02
    plugin id75874
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/75874
    titleopenSUSE Security Update : java-1_6_0-sun (java-1_6_0-sun-5320) (BEAST)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_JAVA-1_5_0-IBM-7862.NASL
    descriptionIBM Java 5 was updated to SR13, fixing various bugs and security issues. Security issues addressed are tracked by : CVE-2011-3545 / CVE-2011-3547 / CVE-2011-3548 / CVE-2011-3549 / CVE-2011-3552 / CVE-2011-3554 / CVE-2011-3557
    last seen2020-06-01
    modified2020-06-02
    plugin id57208
    published2011-12-13
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57208
    titleSuSE 10 Security Update : IBM Java (ZYPP Patch Number 7862)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1478.NASL
    descriptionUpdated java-1.5.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. Detailed vulnerability descriptions are linked from the IBM
    last seen2020-06-01
    modified2020-06-02
    plugin id56942
    published2011-11-26
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56942
    titleRHEL 4 / 5 / 6 : java-1.5.0-ibm (RHSA-2011:1478)
  • NASL familyMisc.
    NASL idORACLE_JAVA_CPU_OCT_2011_UNIX.NASL
    descriptionThe version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier than 7 Update 1 / 6 Update 29 / 5.0 Update 32 / 1.4.2_34. As such, it is potentially affected by security issues in the following components : - 2D - AWT - Deployment - Deserialization - Hotspot - Java Runtime Environment - JAXWS - JSSE - Networking - RMI - Scripting - Sound - Swing
    last seen2020-06-01
    modified2020-06-02
    plugin id64846
    published2013-02-22
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64846
    titleOracle Java SE Multiple Vulnerabilities (October 2011 CPU) (BEAST) (Unix)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2012-0034.NASL
    descriptionUpdated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The IBM Java SE version 6 release includes the IBM Java 6 Runtime Environment and the IBM Java 6 Software Development Kit. This update fixes several vulnerabilities in the IBM Java 6 Runtime Environment and the IBM Java 6 Software Development Kit. Detailed vulnerability descriptions are linked from the IBM
    last seen2020-04-16
    modified2012-01-19
    plugin id57595
    published2012-01-19
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57595
    titleRHEL 5 / 6 : java-1.6.0-ibm (RHSA-2012:0034) (BEAST)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201111-02.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201111-02 (Oracle JRE/JDK: Multiple vulnerabilities) Multiple vulnerabilities have been reported in the Oracle Java implementation. Please review the CVE identifiers referenced below and the associated Oracle Critical Patch Update Advisory for details. Impact : A remote attacker could exploit these vulnerabilities to cause unspecified impact, possibly including remote execution of arbitrary code. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id56724
    published2011-11-07
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56724
    titleGLSA-201111-02 : Oracle JRE/JDK: Multiple vulnerabilities (BEAST)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_JAVA-1_6_0-SUN-111024.NASL
    descriptionOracle/Sun Java 1.6.0 was updated to the u26 release, fixing lots of bugs and security issues. Please see http://www.oracle.com/technetwork/topics/security/javacpuoct2011-44343 1.html for more details.
    last seen2020-06-01
    modified2020-06-02
    plugin id75543
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/75543
    titleopenSUSE Security Update : java-1_6_0-sun (java-1_6_0-sun-5320) (BEAST)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_JAVA-1_6_0-IBM-7926.NASL
    descriptionIBM Java 1.6.0 SR10 has been released fixing the following CVE
    last seen2020-06-05
    modified2012-01-24
    plugin id57658
    published2012-01-24
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57658
    titleSuSE 10 Security Update : IBM Java (ZYPP Patch Number 7926) (BEAST)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_JAVA_10_6_UPDATE6.NASL
    descriptionThe remote Mac OS X host is running a version of Java for Mac OS X 10.6 that is missing Update 6, which updates the Java version to 1.6.0_29. It is, therefore, affected by multiple security vulnerabilities, the most serious of which may allow an untrusted Java applet to execute arbitrary code with the privileges of the current user outside the Java sandbox.
    last seen2019-10-28
    modified2011-11-09
    plugin id56748
    published2011-11-09
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56748
    titleMac OS X : Java for Mac OS X 10.6 Update 6 (BEAST)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_JAVA-1_6_0-IBM-120223.NASL
    descriptionIBM Java 1.6.0 SR10 has been released fixing the following CVE
    last seen2020-06-05
    modified2012-02-29
    plugin id58164
    published2012-02-29
    reporterThis script is Copyright (C) 2012-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/58164
    titleSuSE 11.1 Security Update : IBM Java 1.6.0 (SAT Patch Number 5872)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_JAVA-1_6_0-OPENJDK-111025.NASL
    descriptionOracle/Sun OpenJDK 1.6.0 was updated to the 1.10.4release, fixing lots of bugs and security issues. Please see http://www.oracle.com/technetwork/topics/security/javacpuoct2011-44343 1.html for more details.
    last seen2020-06-01
    modified2020-06-02
    plugin id75539
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/75539
    titleopenSUSE Security Update : java-1_6_0-openjdk (java-1_6_0-openjdk-5329) (BEAST)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_JAVA-1_4_2-IBM-7908.NASL
    descriptionIBM Java 1.4.2 SR13 FP11 has been released and contains various security fixes. http://www.ibm.com/developerworks/java/jdk/alerts/ http://www.mozilla.org/en-US/firefox/10.0/releasenotes/ (CVEs fixed: CVE-2011-3547 / CVE-2011-3548 / CVE-2011-3549 / CVE-2011-3552 / CVE-2011-3545 / CVE-2011-3556 / CVE-2011-3557 / CVE-2011-3389 / CVE-2011-3560 )
    last seen2020-06-05
    modified2012-01-25
    plugin id57683
    published2012-01-25
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57683
    titleSuSE 10 Security Update : IBM Java 1.4.2 (ZYPP Patch Number 7908) (BEAST)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1384.NASL
    descriptionUpdated java-1.6.0-sun packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. This update fixes several vulnerabilities in the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch page, listed in the References section. (CVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3555, CVE-2011-3556, CVE-2011-3557, CVE-2011-3558, CVE-2011-3560, CVE-2011-3561) All users of java-1.6.0-sun are advised to upgrade to these updated packages, which provide JDK and JRE 6 Update 29 and resolve these issues. All running instances of Sun Java must be restarted for the update to take effect.
    last seen2020-06-01
    modified2020-06-02
    plugin id56560
    published2011-10-20
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56560
    titleRHEL 4 / 5 / 6 : java-1.6.0-sun (RHSA-2011:1384) (BEAST)
  • NASL familyMisc.
    NASL idVMWARE_VMSA-2012-0005_REMOTE.NASL
    descriptionThe remote VMware ESX / ESXi host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in the following components : - Apache Tomcat - bzip2 library - JRE - WDDM display driver - XPDM display driver
    last seen2020-06-01
    modified2020-06-02
    plugin id89106
    published2016-03-03
    reporterThis script is Copyright (C) 2016-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/89106
    titleVMware ESX / ESXi Multiple Vulnerabilities (VMSA-2012-0005) (BEAST) (remote check)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_JAVA-1_6_0-OPENJDK-111025.NASL
    descriptionOracle/Sun OpenJDK 1.6.0 was updated to the 1.10.4release, fixing lots of bugs and security issues. Please see http://www.oracle.com/technetwork/topics/security/javacpuoct2011-44343 1.html for more details.
    last seen2020-06-01
    modified2020-06-02
    plugin id75870
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/75870
    titleopenSUSE Security Update : java-1_6_0-openjdk (java-1_6_0-openjdk-5329) (BEAST)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_JAVA_10_7_UPDATE1.NASL
    descriptionThe remote Mac OS X host is running a version of Java for Mac OS X 10.7 that is missing Update 1, which updates the Java version to 1.6.0_29. It is, therefore, affected by multiple security vulnerabilities, the most serious of which may allow an untrusted Java applet to execute arbitrary code with the privileges of the current user outside the Java sandbox.
    last seen2019-10-28
    modified2011-11-09
    plugin id56749
    published2011-11-09
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56749
    titleMac OS X : Java for Mac OS X 10.7 Update 1 (BEAST)
  • NASL familyWindows
    NASL idORACLE_JAVA_CPU_OCT_2011.NASL
    descriptionThe version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier than 7 Update 1 / 6 Update 29 / 5.0 Update 32 / 1.4.2_34 and is potentially affected by security issues in the following components : - 2D - AWT - Deployment - Deserialization - Hotspot - Java Runtime Environment - JAXWS - JSSE - Networking - RMI - Scripting - Sound - Swing
    last seen2020-06-01
    modified2020-06-02
    plugin id56566
    published2011-10-20
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56566
    titleOracle Java SE Multiple Vulnerabilities (October 2011 CPU) (BEAST)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_JAVA-1_4_2-IBM-120105.NASL
    descriptionIBM Java 1.4.2 SR13 FP11 has been released and contains various security fixes. http://www.ibm.com/developerworks/java/jdk/alerts/ http://www.ibm.com/developerworks/java/jdk/alerts/ (CVEs fixed: CVE-2011-3547 / CVE-2011-3548 / CVE-2011-3549 / CVE-2011-3552 / CVE-2011-3545 / CVE-2011-3556 / CVE-2011-3557 / CVE-2011-3389 / CVE-2011-3560)
    last seen2020-06-05
    modified2012-02-24
    plugin id58113
    published2012-02-24
    reporterThis script is Copyright (C) 2012-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/58113
    titleSuSE 11.1 Security Update : IBM Java 1.4.2 (SAT Patch Number 5609)
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2012-0003.NASL
    descriptiona. VirtualCenter and ESX, Oracle (Sun) JRE update 1.5.0_32 Oracle (Sun) JRE is updated to version 1.5.0_32, which addresses multiple security issues that existed in earlier releases of Oracle (Sun) JRE. Oracle has documented the CVE identifiers that are addressed in JRE 1.5.0_32 in the Oracle Java SE Critical Patch Update Advisory of October 2011.
    last seen2020-06-01
    modified2020-06-02
    plugin id58302
    published2012-03-09
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/58302
    titleVMSA-2012-0003 : VMware VirtualCenter Update and ESX 3.5 patch update JRE
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2012-0006.NASL
    descriptionUpdated java-1.4.2-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise Linux 5 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The IBM Java SE version 1.4.2 release includes the IBM Java 1.4.2 Runtime Environment and the IBM Java 1.4.2 Software Development Kit. This update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime Environment and the IBM Java 1.4.2 Software Development Kit. Detailed vulnerability descriptions are linked from the IBM
    last seen2020-04-16
    modified2012-01-10
    plugin id57464
    published2012-01-10
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57464
    titleRHEL 5 : java-1.4.2-ibm (RHSA-2012:0006) (BEAST)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-1455.NASL
    descriptionUpdated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Network Satellite Server 5.4. The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Network Satellite Server 5.4. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. Several flaws were fixed in the IBM Java 2 Runtime Environment. (CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0865, CVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873, CVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560, CVE-2011-3561, CVE-2011-3563, CVE-2011-5035, CVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501, CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507, CVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533, CVE-2012-1541, CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1725, CVE-2012-3143, CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342, CVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068, CVE-2012-5069, CVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5079, CVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5089, CVE-2013-0169, CVE-2013-0351, CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445, CVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476, CVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487, CVE-2013-1491, CVE-2013-1493, CVE-2013-1500, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1563, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424, CVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435, CVE-2013-2437, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2459, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473, CVE-2013-3743) Users of Red Hat Network Satellite Server 5.4 are advised to upgrade to these updated packages, which contain the IBM Java SE 6 SR14 release. For this update to take effect, Red Hat Network Satellite Server must be restarted (
    last seen2020-06-01
    modified2020-06-02
    plugin id78975
    published2014-11-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78975
    titleRHEL 5 / 6 : IBM Java Runtime in Satellite Server (RHSA-2013:1455) (BEAST) (ROBOT)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20111019_JAVA_1_6_0_SUN_ON_SL5_X.NASL
    descriptionThe Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. This update fixes several vulnerabilities in the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch page, listed in the References section. (CVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3555, CVE-2011-3556, CVE-2011-3557, CVE-2011-3558, CVE-2011-3560, CVE-2011-3561) All users of java-1.6.0-sun are advised to upgrade to these updated packages, which provide JDK and JRE 6 Update 29 and resolve these issues. All running instances of Sun Java must be restarted for the update to take effect.
    last seen2020-06-01
    modified2020-06-02
    plugin id61158
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61158
    titleScientific Linux Security Update : java-1.6.0-sun on SL5.x i386/x86_64 (BEAST)

Oval

accepted2015-03-23T04:00:36.719-04:00
classvulnerability
contributors
  • nameScott Quint
    organizationDTCC
  • nameDragos Prisaca
    organizationG2, Inc.
  • nameMaria Mikhno
    organizationALTX-SOFT
  • nameMaria Mikhno
    organizationALTX-SOFT
definition_extensions
  • commentJava SE Runtime Environment 6 is installed
    ovaloval:org.mitre.oval:def:16362
  • commentJava SE Development Kit 5 is installed
    ovaloval:org.mitre.oval:def:16292
  • commentJava SE Runtime Environment 5 is installed
    ovaloval:org.mitre.oval:def:15748
  • commentJava SE Development Kit 6 is installed
    ovaloval:org.mitre.oval:def:15831
descriptionUnspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
familywindows
idoval:org.mitre.oval:def:14180
statusaccepted
submitted2011-11-25T18:04:52.000-05:00
titleUnspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
version11

Redhat

advisories
  • rhsa
    idRHSA-2011:1384
  • rhsa
    idRHSA-2011:1478
  • rhsa
    idRHSA-2012:0006
  • rhsa
    idRHSA-2013:1455
rpms
  • java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4
  • java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5
  • java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6
  • java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4
  • java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5
  • java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6
  • java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4
  • java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5
  • java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6
  • java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4
  • java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5
  • java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6
  • java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4
  • java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5
  • java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6
  • java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4
  • java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5
  • java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6
  • java-1.5.0-ibm-1:1.5.0.13.0-1jpp.1.el4
  • java-1.5.0-ibm-1:1.5.0.13.0-1jpp.1.el5
  • java-1.5.0-ibm-1:1.5.0.13.0-1jpp.1.el6
  • java-1.5.0-ibm-accessibility-1:1.5.0.13.0-1jpp.1.el5
  • java-1.5.0-ibm-demo-1:1.5.0.13.0-1jpp.1.el4
  • java-1.5.0-ibm-demo-1:1.5.0.13.0-1jpp.1.el5
  • java-1.5.0-ibm-demo-1:1.5.0.13.0-1jpp.1.el6
  • java-1.5.0-ibm-devel-1:1.5.0.13.0-1jpp.1.el4
  • java-1.5.0-ibm-devel-1:1.5.0.13.0-1jpp.1.el5
  • java-1.5.0-ibm-devel-1:1.5.0.13.0-1jpp.1.el6
  • java-1.5.0-ibm-javacomm-1:1.5.0.13.0-1jpp.1.el4
  • java-1.5.0-ibm-javacomm-1:1.5.0.13.0-1jpp.1.el5
  • java-1.5.0-ibm-javacomm-1:1.5.0.13.0-1jpp.1.el6
  • java-1.5.0-ibm-jdbc-1:1.5.0.13.0-1jpp.1.el4
  • java-1.5.0-ibm-jdbc-1:1.5.0.13.0-1jpp.1.el5
  • java-1.5.0-ibm-jdbc-1:1.5.0.13.0-1jpp.1.el6
  • java-1.5.0-ibm-plugin-1:1.5.0.13.0-1jpp.1.el4
  • java-1.5.0-ibm-plugin-1:1.5.0.13.0-1jpp.1.el5
  • java-1.5.0-ibm-plugin-1:1.5.0.13.0-1jpp.1.el6
  • java-1.5.0-ibm-src-1:1.5.0.13.0-1jpp.1.el4
  • java-1.5.0-ibm-src-1:1.5.0.13.0-1jpp.1.el5
  • java-1.5.0-ibm-src-1:1.5.0.13.0-1jpp.1.el6
  • java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4
  • java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5
  • java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4
  • java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5
  • java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4
  • java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5
  • java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4
  • java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5
  • java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4
  • java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5
  • java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4
  • java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5
  • java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4
  • java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5
  • java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4
  • java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5
  • java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6
  • java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5
  • java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4
  • java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5
  • java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6
  • java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4
  • java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5
  • java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6
  • java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4
  • java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5
  • java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6
  • java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4
  • java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5
  • java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6
  • java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4
  • java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5
  • java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6
  • java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4
  • java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5
  • java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6
  • java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4
  • java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5
  • java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4
  • java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5
  • java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4
  • java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5
  • java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4
  • java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5
  • java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4
  • java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5
  • java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9
  • java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4
  • java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9
  • java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4

Seebug

bulletinFamilyexploit
descriptionCVE ID: CVE-2011-3389,CVE-2011-3516,CVE-2011-3521,CVE-2011-3544,CVE-2011-3545,CVE-2011-3546,CVE-2011-3547,CVE-2011-3548,CVE-2011-3549,CVE-2011-3550,CVE-2011-3551,CVE-2011-3552,CVE-2011-3553,CVE-2011-3554,CVE-2011-3556,CVE-2011-3557,CVE-2011-3560,CVE-2011-3561,CVE-2011-3563,CVE-2011-5035,CVE-2012-0497,CVE-2012-0498,CVE-2012-0499,CVE-2012-0500,CVE-2012-0501,CVE-2012-0502,CVE-2012-0503,CVE-2012-0505,CVE-2012-0506,CVE-2012-0507,CVE-2012-0732,CVE-2012-2159,CVE-2012-2161 IBM Rational AppScan是应用安全性软件,能够在开发的各个阶段扫描并测试所有常见的Web应用漏洞。 IBM Rational AppScan 8.6之前版本在实现上存在多个漏洞,可被恶意用户利用泄露敏感信息、执行欺骗和XSS攻击、劫持用户会话、对DNS缓存投毒、操作某些数据、造成拒绝服务和控制受影响系统。 0 IBM Rational AppScan 8.x IBM Rational AppScan 7.x 厂商补丁: IBM --- 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.ers.ibm.com/
idSSV:60220
last seen2017-11-19
modified2012-06-16
published2012-06-16
reporterRoot
titleIBM Rational AppScan 8.x/7.x 多个安全漏洞

References