Vulnerabilities > CVE-2013-0429

047910
CVSS 7.6 - HIGH
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
high complexity
oracle
sun
nessus

Summary

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.

Nessus

  • NASL familyWindows
    NASL idLOTUS_DOMINO_8_5_3_FP5.NASL
    descriptionThe remote host has a version of IBM Domino (formerly Lotus Domino) 8.5.x prior to 8.5.3 Fix Pack 5 installed. It is, therefore, reportedly affected by the following vulnerabilities : - The included version of the IBM Java SDK contains a version of the IBM JRE that contains numerous security issues. (CVE-2013-0809, CVE-2013-1493, CVE-2013-2436, CVE-2013-2455, CVE-2013-3006, CVE-2013-3007, CVE-2013-3008, CVE-2013-3009, CVE-2013-3010, CVE-2013-3011, CVE-2013-3012) - Note also that fixes in the Oracle Java CPUs for February, April and June 2013 are included in the fixed IBM Java release, which is itself included in the fixed IBM Domino release. (CVE-2012-1541, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0401, CVE-2013-0402, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0431, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0437, CVE-2013-0438, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0444, CVE-2013-0445, CVE-2013-0446, CVE-2013-0448, CVE-2013-0449, CVE-2013-0450, CVE-2013-1473, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478, CVE-2013-1479, CVE-2013-1480, CVE-2013-1481, CVE-2013-1488, CVE-2013-1489, CVE-2013-1491, CVE-2013-1500, CVE-2013-1518, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1561, CVE-2013-1563, CVE-2013-1564, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2400, CVE-2013-2407, CVE-2013-2412, CVE-2013-2414, CVE-2013-2415, CVE-2013-2416, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2425, CVE-2013-2426, CVE-2013-2427, CVE-2013-2428, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431, CVE-2013-2432, CVE-2013-2433, CVE-2013-2434, CVE-2013-2435, CVE-2013-2437, CVE-2013-2438, CVE-2013-2439, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444, CVE-2013-2445, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2449, CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458, CVE-2013-2459, CVE-2013-2460, CVE-2013-2461, CVE-2013-2462, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2467, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473, CVE-2013-3743, CVE-2013-3744, CVE-2013-4002)
    last seen2020-06-01
    modified2020-06-02
    plugin id70743
    published2013-11-04
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70743
    titleIBM Domino 8.5.x < 8.5.3 FP5 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70743);
      script_version("1.7");
      script_cvs_date("Date: 2019/11/27");
    
      script_cve_id(
        "CVE-2012-1541",
        "CVE-2012-3213",
        "CVE-2012-3342",
        "CVE-2013-0351",
        "CVE-2013-0401",
        "CVE-2013-0402",
        "CVE-2013-0409",
        "CVE-2013-0419",
        "CVE-2013-0423",
        "CVE-2013-0424",
        "CVE-2013-0425",
        "CVE-2013-0426",
        "CVE-2013-0427",
        "CVE-2013-0428",
        "CVE-2013-0429",
        "CVE-2013-0430",
        "CVE-2013-0431",
        "CVE-2013-0432",
        "CVE-2013-0433",
        "CVE-2013-0434",
        "CVE-2013-0435",
        "CVE-2013-0437",
        "CVE-2013-0438",
        "CVE-2013-0440",
        "CVE-2013-0441",
        "CVE-2013-0442",
        "CVE-2013-0443",
        "CVE-2013-0444",
        "CVE-2013-0445",
        "CVE-2013-0446",
        "CVE-2013-0448",
        "CVE-2013-0449",
        "CVE-2013-0450",
        "CVE-2013-0809",
        "CVE-2013-1473",
        "CVE-2013-1475",
        "CVE-2013-1476",
        "CVE-2013-1478",
        "CVE-2013-1479",
        "CVE-2013-1480",
        "CVE-2013-1481",
        "CVE-2013-1488",
        "CVE-2013-1489",
        "CVE-2013-1491",
        "CVE-2013-1493",
        "CVE-2013-1500",
        "CVE-2013-1518",
        "CVE-2013-1537",
        "CVE-2013-1540",
        "CVE-2013-1557",
        "CVE-2013-1558",
        "CVE-2013-1561",
        "CVE-2013-1563",
        "CVE-2013-1564",
        "CVE-2013-1569",
        "CVE-2013-1571",
        "CVE-2013-2383",
        "CVE-2013-2384",
        "CVE-2013-2394",
        "CVE-2013-2400",
        "CVE-2013-2407",
        "CVE-2013-2412",
        "CVE-2013-2414",
        "CVE-2013-2415",
        "CVE-2013-2416",
        "CVE-2013-2417",
        "CVE-2013-2418",
        "CVE-2013-2419",
        "CVE-2013-2420",
        "CVE-2013-2421",
        "CVE-2013-2422",
        "CVE-2013-2423",
        "CVE-2013-2424",
        "CVE-2013-2425",
        "CVE-2013-2426",
        "CVE-2013-2427",
        "CVE-2013-2428",
        "CVE-2013-2429",
        "CVE-2013-2430",
        "CVE-2013-2431",
        "CVE-2013-2432",
        "CVE-2013-2433",
        "CVE-2013-2434",
        "CVE-2013-2435",
        "CVE-2013-2436",
        "CVE-2013-2437",
        "CVE-2013-2438",
        "CVE-2013-2439",
        "CVE-2013-2440",
        "CVE-2013-2442",
        "CVE-2013-2443",
        "CVE-2013-2444",
        "CVE-2013-2445",
        "CVE-2013-2446",
        "CVE-2013-2447",
        "CVE-2013-2448",
        "CVE-2013-2449",
        "CVE-2013-2450",
        "CVE-2013-2451",
        "CVE-2013-2452",
        "CVE-2013-2453",
        "CVE-2013-2454",
        "CVE-2013-2455",
        "CVE-2013-2456",
        "CVE-2013-2457",
        "CVE-2013-2458",
        "CVE-2013-2459",
        "CVE-2013-2460",
        "CVE-2013-2461",
        "CVE-2013-2462",
        "CVE-2013-2463",
        "CVE-2013-2464",
        "CVE-2013-2465",
        "CVE-2013-2466",
        "CVE-2013-2467",
        "CVE-2013-2468",
        "CVE-2013-2469",
        "CVE-2013-2470",
        "CVE-2013-2471",
        "CVE-2013-2472",
        "CVE-2013-2473",
        "CVE-2013-3006",
        "CVE-2013-3007",
        "CVE-2013-3008",
        "CVE-2013-3009",
        "CVE-2013-3010",
        "CVE-2013-3011",
        "CVE-2013-3012",
        "CVE-2013-3743",
        "CVE-2013-3744",
        "CVE-2013-4002"
      );
      script_bugtraq_id(
        57681,
        57686,
        57687,
        57689,
        57691,
        57692,
        57694,
        57696,
        57697,
        57699,
        57700,
        57701,
        57702,
        57703,
        57704,
        57706,
        57707,
        57708,
        57709,
        57710,
        57711,
        57712,
        57713,
        57714,
        57715,
        57716,
        57717,
        57718,
        57719,
        57720,
        57722,
        57723,
        57724,
        57726,
        57727,
        57728,
        57729,
        57730,
        57731,
        58238,
        58296,
        58397,
        58493,
        58504,
        58507,
        59088,
        59089,
        59124,
        59128,
        59131,
        59137,
        59141,
        59145,
        59149,
        59153,
        59154,
        59159,
        59162,
        59165,
        59166,
        59167,
        59170,
        59172,
        59175,
        59178,
        59179,
        59184,
        59185,
        59187,
        59190,
        59191,
        59194,
        59195,
        59203,
        59206,
        59208,
        59212,
        59213,
        59219,
        59220,
        59228,
        59234,
        59243,
        60617,
        60618,
        60619,
        60620,
        60621,
        60622,
        60623,
        60624,
        60625,
        60626,
        60627,
        60629,
        60630,
        60631,
        60632,
        60633,
        60634,
        60635,
        60636,
        60637,
        60638,
        60639,
        60640,
        60641,
        60643,
        60644,
        60645,
        60646,
        60647,
        60649,
        60650,
        60651,
        60652,
        60653,
        60654,
        60655,
        60656,
        60657,
        60658,
        60659,
        61302,
        61306,
        61307,
        61308,
        61310,
        61311,
        61312,
        61313
      );
    
      script_name(english:"IBM Domino 8.5.x < 8.5.3 FP5 Multiple Vulnerabilities");
      script_summary(english:"Checks version of IBM Domino");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host has software installed that is affected by multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote host has a version of IBM Domino (formerly Lotus Domino)
    8.5.x prior to 8.5.3 Fix Pack 5 installed.  It is, therefore,
    reportedly affected by the following vulnerabilities :
    
      - The included version of the IBM Java SDK contains a
        version of the IBM JRE that contains numerous security
        issues. (CVE-2013-0809, CVE-2013-1493, CVE-2013-2436,
        CVE-2013-2455, CVE-2013-3006, CVE-2013-3007,
        CVE-2013-3008, CVE-2013-3009, CVE-2013-3010,
        CVE-2013-3011, CVE-2013-3012)
    
      - Note also that fixes in the Oracle Java CPUs for
        February, April and June 2013 are included in the
        fixed IBM Java release, which is itself included
        in the fixed IBM Domino release.
        (CVE-2012-1541, CVE-2012-3213, CVE-2012-3342,
        CVE-2013-0351, CVE-2013-0401, CVE-2013-0402,
        CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,
        CVE-2013-0424, CVE-2013-0425, CVE-2013-0426,
        CVE-2013-0427, CVE-2013-0428, CVE-2013-0429,
        CVE-2013-0430, CVE-2013-0431, CVE-2013-0432,
        CVE-2013-0433, CVE-2013-0434, CVE-2013-0435,
        CVE-2013-0437, CVE-2013-0438, CVE-2013-0440,
        CVE-2013-0441, CVE-2013-0442, CVE-2013-0443,
        CVE-2013-0444, CVE-2013-0445, CVE-2013-0446,
        CVE-2013-0448, CVE-2013-0449, CVE-2013-0450,
        CVE-2013-1473, CVE-2013-1475, CVE-2013-1476,
        CVE-2013-1478, CVE-2013-1479, CVE-2013-1480,
        CVE-2013-1481, CVE-2013-1488, CVE-2013-1489,
        CVE-2013-1491, CVE-2013-1500, CVE-2013-1518,
        CVE-2013-1537, CVE-2013-1540, CVE-2013-1557,
        CVE-2013-1558, CVE-2013-1561, CVE-2013-1563,
        CVE-2013-1564, CVE-2013-1569, CVE-2013-1571,
        CVE-2013-2383, CVE-2013-2384, CVE-2013-2394,
        CVE-2013-2400, CVE-2013-2407, CVE-2013-2412,
        CVE-2013-2414, CVE-2013-2415, CVE-2013-2416,
        CVE-2013-2417, CVE-2013-2418, CVE-2013-2419,
        CVE-2013-2420, CVE-2013-2421, CVE-2013-2422,
        CVE-2013-2423, CVE-2013-2424, CVE-2013-2425,
        CVE-2013-2426, CVE-2013-2427, CVE-2013-2428,
        CVE-2013-2429, CVE-2013-2430, CVE-2013-2431,
        CVE-2013-2432, CVE-2013-2433, CVE-2013-2434,
        CVE-2013-2435, CVE-2013-2437, CVE-2013-2438,
        CVE-2013-2439, CVE-2013-2440, CVE-2013-2442,
        CVE-2013-2443, CVE-2013-2444, CVE-2013-2445,
        CVE-2013-2446, CVE-2013-2447, CVE-2013-2448,
        CVE-2013-2449, CVE-2013-2450, CVE-2013-2451,
        CVE-2013-2452, CVE-2013-2453, CVE-2013-2454,
        CVE-2013-2456, CVE-2013-2457, CVE-2013-2458,
        CVE-2013-2459, CVE-2013-2460, CVE-2013-2461,
        CVE-2013-2462, CVE-2013-2463, CVE-2013-2464,
        CVE-2013-2465, CVE-2013-2466, CVE-2013-2467,
        CVE-2013-2468, CVE-2013-2469, CVE-2013-2470,
        CVE-2013-2471, CVE-2013-2472, CVE-2013-2473,
        CVE-2013-3743, CVE-2013-3744, CVE-2013-4002)");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24032242#FP5");
      # http://www-10.lotus.com/ldd/fixlist.nsf/8d1c0550e6242b69852570c900549a74/a3940c755daf3a2885257bbf00502b5f?OpenDocument
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f9dfc0b6");
      # http://www-10.lotus.com/ldd/fixlist.nsf/8d1c0550e6242b69852570c900549a74/a3940c755daf3a2885257bbf00502b5f?OpenDocument
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f9dfc0b6");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21644918");
      # https://www.ibm.com/blogs/psirt/security-bulletin-ibm-notes-domino-fixes-for-multiple-vulnerabilities-in-ibm-jre-4/
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?151b7e2b");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to IBM Domino 8.5.3 Fix Pack 5 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-2473");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Java storeImageArray() Invalid Array Indexing Vulnerability');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/08/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/11/04");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:lotus_domino");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("lotus_domino_installed.nasl");
      script_require_keys("SMB/Domino/Installed");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    appname = "IBM Domino";
    kb_base = "SMB/Domino/";
    
    port = get_kb_item('SMB/transport');
    if (isnull(port)) port = 445;
    version = get_kb_item_or_exit(kb_base + 'Version');
    path = get_kb_item_or_exit(kb_base + 'Path');
    
    fix = '8.5.35.13212';
    lower_cutoff = '8.5.0.0';
    
    if (
      ver_compare(ver:version, fix:lower_cutoff, strict:FALSE) >= 0
      &&
      ver_compare(ver:version, fix:fix, strict:FALSE) < 0
    )
    {
      if (report_verbosity > 0)
      {
        report =
          '\n  Path              : ' + path +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : ' + fix + ' (8.5.3 FP5)' +
          '\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }
    else audit(AUDIT_INST_PATH_NOT_VULN, appname, version, path);
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-131.NASL
    descriptionOpenJDK (java-1_6_0-openjdk) was updated to 1.12.2 to fix bugs and security issues (bnc#801972) - Security fixes (on top of 1.12.0) - S6563318, CVE-2013-0424: RMI data sanitization - S6664509, CVE-2013-0425: Add logging context - S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time - S6776941: CVE-2013-0427: Improve thread pool shutdown - S7141694, CVE-2013-0429: Improving CORBA internals - S7173145: Improve in-memory representation of splashscreens - S7186945: Unpack200 improvement - S7186946: Refine unpacker resource usage - S7186948: Improve Swing data validation - S7186952, CVE-2013-0432: Improve clipboard access - S7186954: Improve connection performance - S7186957: Improve Pack200 data validation - S7192392, CVE-2013-0443: Better validation of client keys - S7192393, CVE-2013-0440: Better Checking of order of TLS Messages - S7192977, CVE-2013-0442: Issue in toolkit thread - S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies - S7200491: Tighten up JTable layout code - S7200500: Launcher better input validation - S7201064: Better dialogue checking - S7201066, CVE-2013-0441: Change modifiers on unused fields - S7201068, CVE-2013-0435: Better handling of UI elements - S7201070: Serialization to conform to protocol - S7201071, CVE-2013-0433: InetSocketAddress serialization issue - S8000210: Improve JarFile code quality - S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class - S8000540, CVE-2013-1475: Improve IIOP type reuse management - S8000631, CVE-2013-1476: Restrict access to class constructor - S8001235, CVE-2013-0434: Improve JAXP HTTP handling
    last seen2020-06-05
    modified2014-06-13
    plugin id74896
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/74896
    titleopenSUSE Security Update : java-1_6_0-openjdk (openSUSE-SU-2013:0308-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2013-131.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(74896);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2013-0424", "CVE-2013-0425", "CVE-2013-0426", "CVE-2013-0427", "CVE-2013-0428", "CVE-2013-0429", "CVE-2013-0432", "CVE-2013-0433", "CVE-2013-0434", "CVE-2013-0435", "CVE-2013-0440", "CVE-2013-0441", "CVE-2013-0442", "CVE-2013-0443", "CVE-2013-0450", "CVE-2013-1475", "CVE-2013-1476");
    
      script_name(english:"openSUSE Security Update : java-1_6_0-openjdk (openSUSE-SU-2013:0308-1)");
      script_summary(english:"Check for the openSUSE-2013-131 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "OpenJDK (java-1_6_0-openjdk) was updated to 1.12.2 to fix bugs and
    security issues (bnc#801972)
    
      - Security fixes (on top of 1.12.0)
    
      - S6563318, CVE-2013-0424: RMI data sanitization
    
      - S6664509, CVE-2013-0425: Add logging context
    
      - S6664528, CVE-2013-0426: Find log level matching its
        name or value given at construction time
    
      - S6776941: CVE-2013-0427: Improve thread pool shutdown
    
      - S7141694, CVE-2013-0429: Improving CORBA internals
    
      - S7173145: Improve in-memory representation of
        splashscreens
    
      - S7186945: Unpack200 improvement
    
      - S7186946: Refine unpacker resource usage
    
      - S7186948: Improve Swing data validation
    
      - S7186952, CVE-2013-0432: Improve clipboard access
    
      - S7186954: Improve connection performance
    
      - S7186957: Improve Pack200 data validation
    
      - S7192392, CVE-2013-0443: Better validation of client
        keys
    
      - S7192393, CVE-2013-0440: Better Checking of order of TLS
        Messages
    
      - S7192977, CVE-2013-0442: Issue in toolkit thread
    
      - S7197546, CVE-2013-0428: (proxy) Reflect about creating
        reflective proxies
    
      - S7200491: Tighten up JTable layout code
    
      - S7200500: Launcher better input validation
    
      - S7201064: Better dialogue checking
    
      - S7201066, CVE-2013-0441: Change modifiers on unused
        fields
    
      - S7201068, CVE-2013-0435: Better handling of UI elements
    
      - S7201070: Serialization to conform to protocol
    
      - S7201071, CVE-2013-0433: InetSocketAddress serialization
        issue
    
      - S8000210: Improve JarFile code quality
    
      - S8000537, CVE-2013-0450: Contextualize
        RequiredModelMBean class
    
      - S8000540, CVE-2013-1475: Improve IIOP type reuse
        management
    
      - S8000631, CVE-2013-1476: Restrict access to class
        constructor
    
      - S8001235, CVE-2013-0434: Improve JAXP HTTP handling"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=801972"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.opensuse.org/opensuse-updates/2013-02/msg00052.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected java-1_6_0-openjdk packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_6_0-openjdk");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-demo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-demo-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-devel-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-javadoc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-src");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/02/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE12\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.1", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE12.1", reference:"java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-24.1") ) flag++;
    if ( rpm_check(release:"SUSE12.1", reference:"java-1_6_0-openjdk-debuginfo-1.6.0.0_b27.1.12.2-24.1") ) flag++;
    if ( rpm_check(release:"SUSE12.1", reference:"java-1_6_0-openjdk-debugsource-1.6.0.0_b27.1.12.2-24.1") ) flag++;
    if ( rpm_check(release:"SUSE12.1", reference:"java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-24.1") ) flag++;
    if ( rpm_check(release:"SUSE12.1", reference:"java-1_6_0-openjdk-demo-debuginfo-1.6.0.0_b27.1.12.2-24.1") ) flag++;
    if ( rpm_check(release:"SUSE12.1", reference:"java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-24.1") ) flag++;
    if ( rpm_check(release:"SUSE12.1", reference:"java-1_6_0-openjdk-devel-debuginfo-1.6.0.0_b27.1.12.2-24.1") ) flag++;
    if ( rpm_check(release:"SUSE12.1", reference:"java-1_6_0-openjdk-javadoc-1.6.0.0_b27.1.12.2-24.1") ) flag++;
    if ( rpm_check(release:"SUSE12.1", reference:"java-1_6_0-openjdk-src-1.6.0.0_b27.1.12.2-24.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "java-1_6_0-openjdk");
    }
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_JAVA_10_6_UPDATE12.NASL
    descriptionThe remote Mac OS X host has a version of Java for Mac OS X 10.6 that is missing Update 12, which updates the Java version to 1.6.0_39. It is, therefore, affected by several security vulnerabilities, the most serious of which may allow an untrusted Java applet to execute arbitrary code with the privileges of the current user outside the Java sandbox.
    last seen2019-10-28
    modified2013-02-05
    plugin id64472
    published2013-02-05
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64472
    titleMac OS X : Java for Mac OS X 10.6 Update 12
    code
    #TRUSTED 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
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    
    if (description)
    {
      script_id(64472);
      script_version("1.12");
      script_set_attribute(attribute:"plugin_modification_date", value:"2018/07/14");
    
      script_cve_id(
        "CVE-2012-3213",
        "CVE-2012-3342",
        "CVE-2013-0351",
        "CVE-2013-0409",
        "CVE-2013-0419",
        "CVE-2013-0423",
        "CVE-2013-0424",
        "CVE-2013-0425",
        "CVE-2013-0426",
        "CVE-2013-0427",
        "CVE-2013-0428",
        "CVE-2013-0429",
        "CVE-2013-0432",
        "CVE-2013-0433",
        "CVE-2013-0434",
        "CVE-2013-0435",
        "CVE-2013-0438",
        "CVE-2013-0440",
        "CVE-2013-0441",
        "CVE-2013-0442",
        "CVE-2013-0443",
        "CVE-2013-0445",
        "CVE-2013-0446",
        "CVE-2013-0450",
        "CVE-2013-1473",
        "CVE-2013-1475",
        "CVE-2013-1476",
        "CVE-2013-1478",
        "CVE-2013-1480",
        "CVE-2013-1481"
      );
      script_bugtraq_id(
        57686,
        57687,
        57689,
        57691,
        57692,
        57694,
        57696,
        57699,
        57700,
        57702,
        57703,
        57708,
        57709,
        57710,
        57711,
        57712,
        57713,
        57714,
        57715,
        57716,
        57717,
        57718,
        57719,
        57720,
        57724,
        57727,
        57728,
        57729,
        57730,
        57731
      );
      script_xref(name:"APPLE-SA", value:"APPLE-SA-2013-02-01-1");
      script_xref(name:"CERT", value:"858729");
    
      script_name(english:"Mac OS X : Java for Mac OS X 10.6 Update 12");
      script_summary(english:"Checks version of the JavaVM framework");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote host has a version of Java that is affected by multiple
    vulnerabilities."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "The remote Mac OS X host has a version of Java for Mac OS X 10.6 that
    is missing Update 12, which updates the Java version to 1.6.0_39.  It
    is, therefore, affected by several security vulnerabilities, the most
    serious of which may allow an untrusted Java applet to execute arbitrary
    code with the privileges of the current user outside the Java sandbox."
      );
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-010/");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-011/");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-022/");
      script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/HT5647");
      script_set_attribute(attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2013/Feb/msg00000.html");
      script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/archive/1/525549/30/0/threaded");
      script_set_attribute(
        attribute:"solution",
        value:
    "Upgrade to Java for Mac OS X 10.6 Update 12, which includes version
    13.9.0 of the JavaVM Framework."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/01");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/02/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/02/05");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:java_1.6");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("ssh_func.inc");
    include("macosx_func.inc");
    
    
    
    if(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS)
      enable_ssh_wrappers();
    else disable_ssh_wrappers();
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    os = get_kb_item("Host/MacOSX/Version");
    if (!os) audit(AUDIT_OS_NOT, "Mac OS X");
    if (!ereg(pattern:"Mac OS X 10\.6([^0-9]|$)", string:os))
      audit(AUDIT_OS_NOT, "Mac OS X 10.6");
    
    
    plist = "/System/Library/Frameworks/JavaVM.framework/Versions/A/Resources/version.plist";
    cmd =
      'plutil -convert xml1 -o - \'' + plist + '\' | ' +
      'grep -A 1 CFBundleVersion | ' +
      'tail -n 1 | ' +
      'sed \'s/.*string>\\(.*\\)<\\/string>.*/\\1/g\'';
    version = exec_cmd(cmd:cmd);
    if (!strlen(version)) exit(1, "Failed to get the version of the JavaVM Framework.");
    
    version = chomp(version);
    if (!ereg(pattern:"^[0-9]+\.", string:version)) exit(1, "The JavaVM Framework version does not appear to be numeric ("+version+").");
    
    fixed_version = "13.9.0";
    if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)
    {
      if (report_verbosity > 0)
      {
        report =
          '\n  Framework         : JavaVM' +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : ' + fixed_version + '\n';
        security_hole(port:0, extra:report);
      }
      else security_hole(0);
    }
    else audit(AUDIT_INST_VER_NOT_VULN, "JavaVM Framework", version);
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0245.NASL
    descriptionUpdated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id64518
    published2013-02-10
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64518
    titleRHEL 6 : java-1.6.0-openjdk (RHSA-2013:0245)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2013:0245. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(64518);
      script_version("1.19");
      script_cvs_date("Date: 2019/10/24 15:35:36");
    
      script_cve_id("CVE-2013-0424", "CVE-2013-0425", "CVE-2013-0426", "CVE-2013-0427", "CVE-2013-0428", "CVE-2013-0429", "CVE-2013-0432", "CVE-2013-0433", "CVE-2013-0434", "CVE-2013-0435", "CVE-2013-0440", "CVE-2013-0441", "CVE-2013-0442", "CVE-2013-0443", "CVE-2013-0445", "CVE-2013-0450", "CVE-2013-1475", "CVE-2013-1476", "CVE-2013-1478", "CVE-2013-1480");
      script_xref(name:"RHSA", value:"2013:0245");
    
      script_name(english:"RHEL 6 : java-1.6.0-openjdk (RHSA-2013:0245)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated java-1.6.0-openjdk packages that fix several security issues
    are now available for Red Hat Enterprise Linux 6.
    
    The Red Hat Security Response Team has rated this update as having
    critical security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    These packages provide the OpenJDK 6 Java Runtime Environment and the
    OpenJDK 6 Software Development Kit.
    
    Multiple improper permission check issues were discovered in the AWT,
    CORBA, JMX, and Libraries components in OpenJDK. An untrusted Java
    application or applet could use these flaws to bypass Java sandbox
    restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441,
    CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450,
    CVE-2013-0425, CVE-2013-0426, CVE-2013-0428)
    
    Multiple flaws were found in the way image parsers in the 2D and AWT
    components handled image raster parameters. A specially crafted image
    could cause Java Virtual Machine memory corruption and, possibly, lead
    to arbitrary code execution with the virtual machine privileges.
    (CVE-2013-1478, CVE-2013-1480)
    
    A flaw was found in the AWT component's clipboard handling code. An
    untrusted Java application or applet could use this flaw to access
    clipboard data, bypassing Java sandbox restrictions. (CVE-2013-0432)
    
    The default Java security properties configuration did not restrict
    access to certain com.sun.xml.internal packages. An untrusted Java
    application or applet could use this flaw to access information,
    bypassing certain Java sandbox restrictions. This update lists the
    whole package as restricted. (CVE-2013-0435)
    
    Multiple improper permission check issues were discovered in the
    Libraries, Networking, and JAXP components. An untrusted Java
    application or applet could use these flaws to bypass certain Java
    sandbox restrictions. (CVE-2013-0427, CVE-2013-0433, CVE-2013-0434)
    
    It was discovered that the RMI component's CGIHandler class used user
    inputs in error messages without any sanitization. An attacker could
    use this flaw to perform a cross-site scripting (XSS) attack.
    (CVE-2013-0424)
    
    It was discovered that the SSL/TLS implementation in the JSSE
    component did not properly enforce handshake message ordering,
    allowing an unlimited number of handshake restarts. A remote attacker
    could use this flaw to make an SSL/TLS server using JSSE consume an
    excessive amount of CPU by continuously restarting the handshake.
    (CVE-2013-0440)
    
    It was discovered that the JSSE component did not properly validate
    Diffie-Hellman public keys. An SSL/TLS client could possibly use this
    flaw to perform a small subgroup attack. (CVE-2013-0443)
    
    Note: If the web browser plug-in provided by the icedtea-web package
    was installed, the issues exposed via Java applets could have been
    exploited without user interaction if a user visited a malicious
    website.
    
    This erratum also upgrades the OpenJDK package to IcedTea6 1.11.6.
    Refer to the NEWS file, linked to in the References, for further
    information.
    
    All users of java-1.6.0-openjdk are advised to upgrade to these
    updated packages, which resolve these issues. All running instances of
    OpenJDK Java must be restarted for the update to take effect."
      );
      # http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?d4964317"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2013:0245"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-1478"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0450"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-1476"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-1475"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-1480"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0427"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0426"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0425"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0424"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0429"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0445"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0441"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0440"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0443"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0442"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0432"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0433"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0434"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0435"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-0428"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-demo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-javadoc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-src");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.3");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/01");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/02/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/02/10");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2013:0245";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL6", cpu:"i686", reference:"java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"i686", reference:"java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"i686", reference:"java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"i686", reference:"java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"i686", reference:"java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"i686", reference:"java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3")) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "java-1.6.0-openjdk / java-1.6.0-openjdk-debuginfo / etc");
      }
    }
    
  • NASL familyMisc.
    NASL idDOMINO_9_0_1.NASL
    descriptionAccording to its banner, the version of IBM Domino (formerly IBM Lotus Domino) on the remote host is 9.x earlier than 9.0.1. It is, therefore, affected by the following vulnerabilities : - The included version of the IBM Java SDK contains a version of IBM JRE that contains numerous security issues. (CVE-2013-0809, CVE-2013-1493, CVE-2013-2436, CVE-2013-2455, CVE-2013-3006, CVE-2013-3007, CVE-2013-3008, CVE-2013-3009, CVE-2013-3010, CVE-2013-3011, CVE-2013-3012) - An input validation error exists related to handling content in email messages that could allow cross-site scripting attacks. (CVE-2013-4063) - An input validation error exists related to iNotes when running in
    last seen2020-06-01
    modified2020-06-02
    plugin id71859
    published2014-01-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/71859
    titleIBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (uncredentialed check)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(71859);
      script_version("1.6");
      script_cvs_date("Date: 2019/11/26");
    
      script_cve_id(
        "CVE-2012-1541",
        "CVE-2012-3213",
        "CVE-2012-3342",
        "CVE-2013-0351",
        "CVE-2013-0401",
        "CVE-2013-0402",
        "CVE-2013-0409",
        "CVE-2013-0419",
        "CVE-2013-0423",
        "CVE-2013-0424",
        "CVE-2013-0425",
        "CVE-2013-0426",
        "CVE-2013-0427",
        "CVE-2013-0428",
        "CVE-2013-0429",
        "CVE-2013-0430",
        "CVE-2013-0431",
        "CVE-2013-0432",
        "CVE-2013-0433",
        "CVE-2013-0434",
        "CVE-2013-0435",
        "CVE-2013-0437",
        "CVE-2013-0438",
        "CVE-2013-0440",
        "CVE-2013-0441",
        "CVE-2013-0442",
        "CVE-2013-0443",
        "CVE-2013-0444",
        "CVE-2013-0445",
        "CVE-2013-0446",
        "CVE-2013-0448",
        "CVE-2013-0449",
        "CVE-2013-0450",
        "CVE-2013-0809",
        "CVE-2013-1473",
        "CVE-2013-1475",
        "CVE-2013-1476",
        "CVE-2013-1478",
        "CVE-2013-1479",
        "CVE-2013-1480",
        "CVE-2013-1481",
        "CVE-2013-1488",
        "CVE-2013-1489",
        "CVE-2013-1491",
        "CVE-2013-1493",
        "CVE-2013-1500",
        "CVE-2013-1518",
        "CVE-2013-1537",
        "CVE-2013-1540",
        "CVE-2013-1557",
        "CVE-2013-1558",
        "CVE-2013-1561",
        "CVE-2013-1563",
        "CVE-2013-1564",
        "CVE-2013-1569",
        "CVE-2013-1571",
        "CVE-2013-2383",
        "CVE-2013-2384",
        "CVE-2013-2394",
        "CVE-2013-2400",
        "CVE-2013-2407",
        "CVE-2013-2412",
        "CVE-2013-2414",
        "CVE-2013-2415",
        "CVE-2013-2416",
        "CVE-2013-2417",
        "CVE-2013-2418",
        "CVE-2013-2419",
        "CVE-2013-2420",
        "CVE-2013-2421",
        "CVE-2013-2422",
        "CVE-2013-2423",
        "CVE-2013-2424",
        "CVE-2013-2425",
        "CVE-2013-2426",
        "CVE-2013-2427",
        "CVE-2013-2428",
        "CVE-2013-2429",
        "CVE-2013-2430",
        "CVE-2013-2431",
        "CVE-2013-2432",
        "CVE-2013-2433",
        "CVE-2013-2434",
        "CVE-2013-2435",
        "CVE-2013-2436",
        "CVE-2013-2437",
        "CVE-2013-2438",
        "CVE-2013-2439",
        "CVE-2013-2440",
        "CVE-2013-2442",
        "CVE-2013-2443",
        "CVE-2013-2444",
        "CVE-2013-2445",
        "CVE-2013-2446",
        "CVE-2013-2447",
        "CVE-2013-2448",
        "CVE-2013-2449",
        "CVE-2013-2450",
        "CVE-2013-2451",
        "CVE-2013-2452",
        "CVE-2013-2453",
        "CVE-2013-2454",
        "CVE-2013-2455",
        "CVE-2013-2456",
        "CVE-2013-2457",
        "CVE-2013-2458",
        "CVE-2013-2459",
        "CVE-2013-2460",
        "CVE-2013-2461",
        "CVE-2013-2462",
        "CVE-2013-2463",
        "CVE-2013-2464",
        "CVE-2013-2465",
        "CVE-2013-2466",
        "CVE-2013-2467",
        "CVE-2013-2468",
        "CVE-2013-2469",
        "CVE-2013-2470",
        "CVE-2013-2471",
        "CVE-2013-2472",
        "CVE-2013-2473",
        "CVE-2013-3006",
        "CVE-2013-3007",
        "CVE-2013-3008",
        "CVE-2013-3009",
        "CVE-2013-3010",
        "CVE-2013-3011",
        "CVE-2013-3012",
        "CVE-2013-3743",
        "CVE-2013-3744",
        "CVE-2013-4002",
        "CVE-2013-4063",
        "CVE-2013-4064",
        "CVE-2013-4065"
      );
      script_bugtraq_id(
        57681,
        57686,
        57687,
        57689,
        57691,
        57692,
        57694,
        57696,
        57697,
        57699,
        57700,
        57701,
        57702,
        57703,
        57704,
        57706,
        57707,
        57708,
        57709,
        57710,
        57711,
        57712,
        57713,
        57714,
        57715,
        57716,
        57717,
        57718,
        57719,
        57720,
        57722,
        57723,
        57724,
        57726,
        57727,
        57728,
        57729,
        57730,
        57731,
        58238,
        58296,
        58397,
        58493,
        58504,
        58507,
        59088,
        59089,
        59124,
        59128,
        59131,
        59137,
        59141,
        59145,
        59149,
        59153,
        59154,
        59159,
        59162,
        59165,
        59166,
        59167,
        59170,
        59172,
        59175,
        59178,
        59179,
        59184,
        59185,
        59187,
        59190,
        59191,
        59194,
        59195,
        59203,
        59206,
        59208,
        59212,
        59213,
        59219,
        59220,
        59228,
        59234,
        59243,
        60617,
        60618,
        60619,
        60620,
        60621,
        60622,
        60623,
        60624,
        60625,
        60626,
        60627,
        60629,
        60630,
        60631,
        60632,
        60633,
        60634,
        60635,
        60636,
        60637,
        60638,
        60639,
        60640,
        60641,
        60643,
        60644,
        60645,
        60646,
        60647,
        60649,
        60650,
        60651,
        60652,
        60653,
        60654,
        60655,
        60656,
        60657,
        60658,
        60659,
        61302,
        61306,
        61307,
        61308,
        61310,
        61311,
        61312,
        61313,
        64444,
        64445,
        64451
      );
    
      script_name(english:"IBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (uncredentialed check)");
      script_summary(english:"Checks version of IBM Domino");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote server is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "According to its banner, the version of IBM Domino (formerly IBM Lotus
    Domino) on the remote host is 9.x earlier than 9.0.1.  It is, therefore,
    affected by the following vulnerabilities :
    
      - The included version of the IBM Java SDK contains a
        version of IBM JRE that contains numerous security
        issues. (CVE-2013-0809, CVE-2013-1493, CVE-2013-2436,
        CVE-2013-2455, CVE-2013-3006, CVE-2013-3007,
        CVE-2013-3008, CVE-2013-3009, CVE-2013-3010,
        CVE-2013-3011, CVE-2013-3012)
    
      - An input validation error exists related to handling
        content in email messages that could allow cross-site
        scripting attacks. (CVE-2013-4063)
    
      - An input validation error exists related to iNotes when
        running in 'ultra-light' mode that could allow cross-
        site scripting attacks. (CVE-2013-4064)
    
      - An input validation error exists related to handling
        content in email messages and iNotes when running in
        'ultra-light' mode that could allow cross-site
        scripting attacks. (CVE-2013-4065)
    
      - Note that fixes in the Oracle Java CPUs for February,
        April and June 2013 are included in the fixed IBM Java
        release, which is included in the fixed IBM Domino
        release. (CVE-2012-1541, CVE-2012-3213, CVE-2012-3342,
        CVE-2013-0351, CVE-2013-0401, CVE-2013-0402,
        CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,
        CVE-2013-0424, CVE-2013-0425, CVE-2013-0426,
        CVE-2013-0427, CVE-2013-0428, CVE-2013-0429,
        CVE-2013-0430, CVE-2013-0431, CVE-2013-0432,
        CVE-2013-0433, CVE-2013-0434, CVE-2013-0435,
        CVE-2013-0437, CVE-2013-0438, CVE-2013-0440,
        CVE-2013-0441, CVE-2013-0442, CVE-2013-0443,
        CVE-2013-0444, CVE-2013-0445, CVE-2013-0446,
        CVE-2013-0448, CVE-2013-0449, CVE-2013-0450,
        CVE-2013-1473, CVE-2013-1475, CVE-2013-1476,
        CVE-2013-1478, CVE-2013-1479, CVE-2013-1480,
        CVE-2013-1481, CVE-2013-1488, CVE-2013-1489,
        CVE-2013-1491, CVE-2013-1500, CVE-2013-1518,
        CVE-2013-1537, CVE-2013-1540, CVE-2013-1557,
        CVE-2013-1558, CVE-2013-1561, CVE-2013-1563,
        CVE-2013-1564, CVE-2013-1569, CVE-2013-1571,
        CVE-2013-2383, CVE-2013-2384, CVE-2013-2394,
        CVE-2013-2400, CVE-2013-2407, CVE-2013-2412,
        CVE-2013-2414, CVE-2013-2415, CVE-2013-2416,
        CVE-2013-2417, CVE-2013-2418, CVE-2013-2419,
        CVE-2013-2420, CVE-2013-2421, CVE-2013-2422,
        CVE-2013-2423, CVE-2013-2424, CVE-2013-2425,
        CVE-2013-2426, CVE-2013-2427, CVE-2013-2428,
        CVE-2013-2429, CVE-2013-2430, CVE-2013-2431,
        CVE-2013-2432, CVE-2013-2433, CVE-2013-2434,
        CVE-2013-2435, CVE-2013-2437, CVE-2013-2438,
        CVE-2013-2439, CVE-2013-2440, CVE-2013-2442,
        CVE-2013-2443, CVE-2013-2444, CVE-2013-2445,
        CVE-2013-2446, CVE-2013-2447, CVE-2013-2448,
        CVE-2013-2449, CVE-2013-2450, CVE-2013-2451,
        CVE-2013-2452, CVE-2013-2453, CVE-2013-2454,
        CVE-2013-2456, CVE-2013-2457, CVE-2013-2458,
        CVE-2013-2459, CVE-2013-2460, CVE-2013-2461,
        CVE-2013-2462, CVE-2013-2463, CVE-2013-2464,
        CVE-2013-2465, CVE-2013-2466, CVE-2013-2467,
        CVE-2013-2468, CVE-2013-2469, CVE-2013-2470,
        CVE-2013-2471, CVE-2013-2472, CVE-2013-2473,
        CVE-2013-3743, CVE-2013-3744, CVE-2013-4002)");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg27010592#ver901");
      # http://www-10.lotus.com/ldd/fixlist.nsf/8d1c0550e6242b69852570c900549a74/de0329821264ceff85257c130056adda?OpenDocument
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fabb9d8f");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21644918");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to IBM Domino 9.0.1 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-2473");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Java storeImageArray() Invalid Array Indexing Vulnerability');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/01/08");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:lotus_domino");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("domino_installed.nasl");
      script_require_keys("Domino/Version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    # Check the version of Domino installed.
    ver = get_kb_item_or_exit("Domino/Version");
    
    port = get_kb_item("Domino/Version_provided_by_port");
    if (!port) port = 0;
    
    # Check that version is granular enough
    if (ver == "9") audit(AUDIT_VER_NOT_GRANULAR, "IBM Domino", port, ver);
    
    # Check that version is 9.0.x
    if (ver !~ "^9\.0($|[^0-9])") audit(AUDIT_NOT_LISTEN, "IBM Domino 9.0.x", port);
    
    # Affected 9.x < 9.0.1
    if (
      ver == "9.0"                    ||
      ver =~ "^9\.0\.0($|[^0-9])"
    )
    {
      set_kb_item(name:"www/"+port+"/XSS", value:TRUE);
      if (report_verbosity > 0)
      {
        report =
          '\n' +
          '\n  Installed version : ' + ver +
          '\n  Fixed version     : 9.0.1' +
          '\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, "IBM Domino", port, ver);
    
  • NASL familyWindows
    NASL idLOTUS_DOMINO_9_0_1.NASL
    descriptionThe remote host has a version of IBM Domino (formerly Lotus Domino) 9.x prior to 9.0.1 installed. It is, therefore, reportedly affected by the following vulnerabilities : - The included version of the IBM Java SDK contains a version of IBM JRE that contains numerous security issues. (CVE-2013-0809, CVE-2013-1493, CVE-2013-2436, CVE-2013-2455, CVE-2013-3006, CVE-2013-3007, CVE-2013-3008, CVE-2013-3009, CVE-2013-3010, CVE-2013-3011, CVE-2013-3012) - An input validation error exists related to handling content in email messages that could allow cross-site scripting attacks. (CVE-2013-4063) - An input validation error exists related to iNotes when running in
    last seen2020-06-01
    modified2020-06-02
    plugin id71861
    published2014-01-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/71861
    titleIBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (credentialed check)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(71861);
      script_version("1.7");
      script_cvs_date("Date: 2019/11/26");
    
      script_cve_id(
        "CVE-2012-1541",
        "CVE-2012-3213",
        "CVE-2012-3342",
        "CVE-2013-0351",
        "CVE-2013-0401",
        "CVE-2013-0402",
        "CVE-2013-0409",
        "CVE-2013-0419",
        "CVE-2013-0423",
        "CVE-2013-0424",
        "CVE-2013-0425",
        "CVE-2013-0426",
        "CVE-2013-0427",
        "CVE-2013-0428",
        "CVE-2013-0429",
        "CVE-2013-0430",
        "CVE-2013-0431",
        "CVE-2013-0432",
        "CVE-2013-0433",
        "CVE-2013-0434",
        "CVE-2013-0435",
        "CVE-2013-0437",
        "CVE-2013-0438",
        "CVE-2013-0440",
        "CVE-2013-0441",
        "CVE-2013-0442",
        "CVE-2013-0443",
        "CVE-2013-0444",
        "CVE-2013-0445",
        "CVE-2013-0446",
        "CVE-2013-0448",
        "CVE-2013-0449",
        "CVE-2013-0450",
        "CVE-2013-0809",
        "CVE-2013-1473",
        "CVE-2013-1475",
        "CVE-2013-1476",
        "CVE-2013-1478",
        "CVE-2013-1479",
        "CVE-2013-1480",
        "CVE-2013-1481",
        "CVE-2013-1488",
        "CVE-2013-1489",
        "CVE-2013-1491",
        "CVE-2013-1493",
        "CVE-2013-1500",
        "CVE-2013-1518",
        "CVE-2013-1537",
        "CVE-2013-1540",
        "CVE-2013-1557",
        "CVE-2013-1558",
        "CVE-2013-1561",
        "CVE-2013-1563",
        "CVE-2013-1564",
        "CVE-2013-1569",
        "CVE-2013-1571",
        "CVE-2013-2383",
        "CVE-2013-2384",
        "CVE-2013-2394",
        "CVE-2013-2400",
        "CVE-2013-2407",
        "CVE-2013-2412",
        "CVE-2013-2414",
        "CVE-2013-2415",
        "CVE-2013-2416",
        "CVE-2013-2417",
        "CVE-2013-2418",
        "CVE-2013-2419",
        "CVE-2013-2420",
        "CVE-2013-2421",
        "CVE-2013-2422",
        "CVE-2013-2423",
        "CVE-2013-2424",
        "CVE-2013-2425",
        "CVE-2013-2426",
        "CVE-2013-2427",
        "CVE-2013-2428",
        "CVE-2013-2429",
        "CVE-2013-2430",
        "CVE-2013-2431",
        "CVE-2013-2432",
        "CVE-2013-2433",
        "CVE-2013-2434",
        "CVE-2013-2435",
        "CVE-2013-2436",
        "CVE-2013-2437",
        "CVE-2013-2438",
        "CVE-2013-2439",
        "CVE-2013-2440",
        "CVE-2013-2442",
        "CVE-2013-2443",
        "CVE-2013-2444",
        "CVE-2013-2445",
        "CVE-2013-2446",
        "CVE-2013-2447",
        "CVE-2013-2448",
        "CVE-2013-2449",
        "CVE-2013-2450",
        "CVE-2013-2451",
        "CVE-2013-2452",
        "CVE-2013-2453",
        "CVE-2013-2454",
        "CVE-2013-2455",
        "CVE-2013-2456",
        "CVE-2013-2457",
        "CVE-2013-2458",
        "CVE-2013-2459",
        "CVE-2013-2460",
        "CVE-2013-2461",
        "CVE-2013-2462",
        "CVE-2013-2463",
        "CVE-2013-2464",
        "CVE-2013-2465",
        "CVE-2013-2466",
        "CVE-2013-2467",
        "CVE-2013-2468",
        "CVE-2013-2469",
        "CVE-2013-2470",
        "CVE-2013-2471",
        "CVE-2013-2472",
        "CVE-2013-2473",
        "CVE-2013-3006",
        "CVE-2013-3007",
        "CVE-2013-3008",
        "CVE-2013-3009",
        "CVE-2013-3010",
        "CVE-2013-3011",
        "CVE-2013-3012",
        "CVE-2013-3743",
        "CVE-2013-3744",
        "CVE-2013-4002",
        "CVE-2013-4063",
        "CVE-2013-4064",
        "CVE-2013-4065"
      );
      script_bugtraq_id(
        57681,
        57686,
        57687,
        57689,
        57691,
        57692,
        57694,
        57696,
        57697,
        57699,
        57700,
        57701,
        57702,
        57703,
        57704,
        57706,
        57707,
        57708,
        57709,
        57710,
        57711,
        57712,
        57713,
        57714,
        57715,
        57716,
        57717,
        57718,
        57719,
        57720,
        57722,
        57723,
        57724,
        57726,
        57727,
        57728,
        57729,
        57730,
        57731,
        58238,
        58296,
        58397,
        58493,
        58504,
        58507,
        59088,
        59089,
        59124,
        59128,
        59131,
        59137,
        59141,
        59145,
        59149,
        59153,
        59154,
        59159,
        59162,
        59165,
        59166,
        59167,
        59170,
        59172,
        59175,
        59178,
        59179,
        59184,
        59185,
        59187,
        59190,
        59191,
        59194,
        59195,
        59203,
        59206,
        59208,
        59212,
        59213,
        59219,
        59220,
        59228,
        59234,
        59243,
        60617,
        60618,
        60619,
        60620,
        60621,
        60622,
        60623,
        60624,
        60625,
        60626,
        60627,
        60629,
        60630,
        60631,
        60632,
        60633,
        60634,
        60635,
        60636,
        60637,
        60638,
        60639,
        60640,
        60641,
        60643,
        60644,
        60645,
        60646,
        60647,
        60649,
        60650,
        60651,
        60652,
        60653,
        60654,
        60655,
        60656,
        60657,
        60658,
        60659,
        61302,
        61306,
        61307,
        61308,
        61310,
        61311,
        61312,
        61313,
        64444,
        64445,
        64451
      );
    
      script_name(english:"IBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (credentialed check)");
      script_summary(english:"Checks version of IBM Domino");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host has software installed that is affected by multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote host has a version of IBM Domino (formerly Lotus Domino)
    9.x prior to 9.0.1 installed. It is, therefore, reportedly affected by
    the following vulnerabilities :
    
      - The included version of the IBM Java SDK contains a
        version of IBM JRE that contains numerous security
        issues. (CVE-2013-0809, CVE-2013-1493, CVE-2013-2436,
        CVE-2013-2455, CVE-2013-3006, CVE-2013-3007,
        CVE-2013-3008, CVE-2013-3009, CVE-2013-3010,
        CVE-2013-3011, CVE-2013-3012)
    
      - An input validation error exists related to handling
        content in email messages that could allow cross-site
        scripting attacks. (CVE-2013-4063)
    
      - An input validation error exists related to iNotes when
        running in 'ultra-light' mode that could allow cross-
        site scripting attacks. (CVE-2013-4064)
    
      - An input validation error exists related to handling
        content in email messages and iNotes when running in
        'ultra-light' mode that could allow cross-site
        scripting attacks. (CVE-2013-4065)
    
      - Note that fixes in the Oracle Java CPUs for February,
        April and June 2013 are included in the fixed IBM Java
        release, which is included in the fixed IBM Domino
        release. (CVE-2012-1541, CVE-2012-3213, CVE-2012-3342,
        CVE-2013-0351, CVE-2013-0401, CVE-2013-0402,
        CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,
        CVE-2013-0424, CVE-2013-0425, CVE-2013-0426,
        CVE-2013-0427, CVE-2013-0428, CVE-2013-0429,
        CVE-2013-0430, CVE-2013-0431, CVE-2013-0432,
        CVE-2013-0433, CVE-2013-0434, CVE-2013-0435,
        CVE-2013-0437, CVE-2013-0438, CVE-2013-0440,
        CVE-2013-0441, CVE-2013-0442, CVE-2013-0443,
        CVE-2013-0444, CVE-2013-0445, CVE-2013-0446,
        CVE-2013-0448, CVE-2013-0449, CVE-2013-0450,
        CVE-2013-1473, CVE-2013-1475, CVE-2013-1476,
        CVE-2013-1478, CVE-2013-1479, CVE-2013-1480,
        CVE-2013-1481, CVE-2013-1488, CVE-2013-1489,
        CVE-2013-1491, CVE-2013-1500, CVE-2013-1518,
        CVE-2013-1537, CVE-2013-1540, CVE-2013-1557,
        CVE-2013-1558, CVE-2013-1561, CVE-2013-1563,
        CVE-2013-1564, CVE-2013-1569, CVE-2013-1571,
        CVE-2013-2383, CVE-2013-2384, CVE-2013-2394,
        CVE-2013-2400, CVE-2013-2407, CVE-2013-2412,
        CVE-2013-2414, CVE-2013-2415, CVE-2013-2416,
        CVE-2013-2417, CVE-2013-2418, CVE-2013-2419,
        CVE-2013-2420, CVE-2013-2421, CVE-2013-2422,
        CVE-2013-2423, CVE-2013-2424, CVE-2013-2425,
        CVE-2013-2426, CVE-2013-2427, CVE-2013-2428,
        CVE-2013-2429, CVE-2013-2430, CVE-2013-2431,
        CVE-2013-2432, CVE-2013-2433, CVE-2013-2434,
        CVE-2013-2435, CVE-2013-2437, CVE-2013-2438,
        CVE-2013-2439, CVE-2013-2440, CVE-2013-2442,
        CVE-2013-2443, CVE-2013-2444, CVE-2013-2445,
        CVE-2013-2446, CVE-2013-2447, CVE-2013-2448,
        CVE-2013-2449, CVE-2013-2450, CVE-2013-2451,
        CVE-2013-2452, CVE-2013-2453, CVE-2013-2454,
        CVE-2013-2456, CVE-2013-2457, CVE-2013-2458,
        CVE-2013-2459, CVE-2013-2460, CVE-2013-2461,
        CVE-2013-2462, CVE-2013-2463, CVE-2013-2464,
        CVE-2013-2465, CVE-2013-2466, CVE-2013-2467,
        CVE-2013-2468, CVE-2013-2469, CVE-2013-2470,
        CVE-2013-2471, CVE-2013-2472, CVE-2013-2473,
        CVE-2013-3743, CVE-2013-3744, CVE-2013-4002)");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg27010592#ver901");
      # http://www-10.lotus.com/ldd/fixlist.nsf/8d1c0550e6242b69852570c900549a74/de0329821264ceff85257c130056adda?OpenDocument
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fabb9d8f");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21644918");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to IBM Domino 9.0.1 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-2473");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Java storeImageArray() Invalid Array Indexing Vulnerability');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/01/08");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:lotus_domino");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("lotus_domino_installed.nasl");
      script_require_keys("SMB/Domino/Installed");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    appname = "IBM Domino";
    kb_base = "SMB/Domino/";
    
    port = get_kb_item('SMB/transport');
    if (isnull(port)) port = 445;
    
    version = get_kb_item_or_exit(kb_base + 'Version');
    path = get_kb_item_or_exit(kb_base + 'Path');
    
    fix = '9.0.10.13287';
    lower_cutoff = '9.0.0.0';
    
    if (
      ver_compare(ver:version, fix:lower_cutoff, strict:FALSE) >= 0 &&
      ver_compare(ver:version, fix:fix, strict:FALSE) < 0
    )
    {
      set_kb_item(name:"www/"+port+"/XSS", value:TRUE);
      if (report_verbosity > 0)
      {
        report =
          '\n  Path              : ' + path +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : ' + fix + ' (9.0.1)' +
          '\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }
    else audit(AUDIT_INST_PATH_NOT_VULN, appname, version, path);
    
  • NASL familyMisc.
    NASL idORACLE_JAVA_CPU_FEB_2013_UNIX.NASL
    descriptionThe version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier than 7 Update 13 or 6 Update 39, or is earlier than or equal to 5 Update 38 or 1.4.2 Update 40. It is, therefore, potentially affected by security issues in the following components : - 2D - AWT - Beans - CORBA - Deployment - Install - JavaFX - JAXP - JAX-WS - JMX - JSSE - Libraries - Networking - RMI - Scripting - Sound
    last seen2020-06-01
    modified2020-06-02
    plugin id64850
    published2013-02-22
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64850
    titleOracle Java SE Multiple Vulnerabilities (February 2013 CPU) (Unix)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(64850);
      script_version("1.11");
      script_cvs_date("Date: 2018/11/15 20:50:23");
    
      script_cve_id(
        "CVE-2012-1541",
        "CVE-2012-1543",
        "CVE-2012-3213",
        "CVE-2012-3342",
        "CVE-2012-4301",
        "CVE-2012-4305",
        "CVE-2013-0351",
        "CVE-2013-0409",
        "CVE-2013-0419",
        "CVE-2013-0423",
        "CVE-2013-0424",
        "CVE-2013-0425",
        "CVE-2013-0426",
        "CVE-2013-0427",
        "CVE-2013-0428",
        "CVE-2013-0429",
        "CVE-2013-0430",
        "CVE-2013-0431",
        "CVE-2013-0432",
        "CVE-2013-0433",
        "CVE-2013-0434",
        "CVE-2013-0435",
        "CVE-2013-0436",
        "CVE-2013-0437",
        "CVE-2013-0438",
        "CVE-2013-0439",
        "CVE-2013-0440",
        "CVE-2013-0441",
        "CVE-2013-0442",
        "CVE-2013-0443",
        "CVE-2013-0444",
        "CVE-2013-0445",
        "CVE-2013-0446",
        "CVE-2013-0447",
        "CVE-2013-0448",
        "CVE-2013-0449",
        "CVE-2013-0450",
        "CVE-2013-1472",
        "CVE-2013-1473",
        "CVE-2013-1474",
        "CVE-2013-1475",
        "CVE-2013-1476",
        "CVE-2013-1477",
        "CVE-2013-1478",
        "CVE-2013-1479",
        "CVE-2013-1480",
        "CVE-2013-1481",
        "CVE-2013-1482",
        "CVE-2013-1483",
        "CVE-2013-1489"
      );
      script_bugtraq_id(
        57681,
        57682,
        57683,
        57684,
        57685,
        57686,
        57687,
        57688,
        57689,
        57690,
        57691,
        57692,
        57693,
        57694,
        57695,
        57696,
        57697,
        57699,
        57700,
        57701,
        57702,
        57703,
        57704,
        57705,
        57706,
        57707,
        57708,
        57709,
        57710,
        57711,
        57712,
        57713,
        57714,
        57715,
        57716,
        57717,
        57718,
        57719,
        57720,
        57721,
        57722,
        57723,
        57724,
        57725,
        57726,
        57727,
        57728,
        57729,
        57730,
        57731
      );
      script_xref(name:"CERT", value:"858729");
      script_xref(name:"EDB-ID", value:"24539");
    
      script_name(english:"Oracle Java SE Multiple Vulnerabilities (February 2013 CPU) (Unix)");
      script_summary(english:"Checks version of the JRE");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Unix host contains a programming platform that is
    potentially affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Oracle (formerly Sun) Java SE or Java for Business
    installed on the remote host is earlier than 7 Update 13 or 6 Update 39,
    or is earlier than or equal to 5 Update 38 or 1.4.2 Update 40.  It is,
    therefore, potentially affected by security issues in the following
    components :
    
      - 2D
      - AWT
      - Beans
      - CORBA
      - Deployment
      - Install
      - JavaFX
      - JAXP
      - JAX-WS
      - JMX
      - JSSE
      - Libraries
      - Networking
      - RMI
      - Scripting
      - Sound");
      script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2013/Feb/12");
      script_set_attribute(attribute:"see_also", value:"http://www.security-explorations.com/en/SE-2012-01-details.html");
      # http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a915dbbd");
      script_set_attribute(attribute:"solution", value:
    "Update to JDK / JRE 7 Update 13 or 6 Update 39 or later and, if
    necessary, remove any affected versions.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Java Applet JMX Remote Code Execution');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/01/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/02/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/02/22");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:jre");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:jdk");
      script_set_attribute(attribute:"agent", value:"unix");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
    
      script_dependencies("sun_java_jre_installed_unix.nasl");
      script_require_keys("Host/Java/JRE/Installed");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    # Check each installed JRE.
    installs = get_kb_list_or_exit("Host/Java/JRE/Unmanaged/*");
    
    info = "";
    vuln = 0;
    vuln2 = 0;
    installed_versions = "";
    granular = "";
    
    foreach install (list_uniq(keys(installs)))
    {
      ver = install - "Host/Java/JRE/Unmanaged/";
      if (ver !~ "^[0-9.]+") continue;
    
      installed_versions = installed_versions + " & " + ver;
    
      if (
        ver =~ '^1\\.4\\.2_([0-9]|[0-3][0-9]|40)([^0-9]|$)' ||
        ver =~ '^1\\.5\\.0_([0-9]|[0-2][0-9]|3[0-8])([^0-9]|$)' ||
        ver =~ '^1\\.6\\.0_([0-9]|[0-2][0-9]|3[0-8])([^0-9]|$)' ||
        ver =~ '^1\\.7\\.0_(0[0-9]|1[0-2])([^0-9]|$)'
      )
      {
        dirs = make_list(get_kb_list(install));
        vuln += max_index(dirs);
    
        foreach dir (dirs)
          info += '\n  Path              : ' + dir;
    
        info += '\n  Installed version : ' + ver;
        info += '\n  Fixed version     : 1.6.0_39 / 1.7.0_13\n';
      }
      else if (ver =~ "^[\d\.]+$")
      {
        dirs = make_list(get_kb_list(install));
        foreach dir (dirs)
          granular += "The Oracle Java version "+ver+" at "+dir+" is not granular enough to make a determination."+'\n';
      }
      else
      {
        dirs = make_list(get_kb_list(install));
        vuln2 += max_index(dirs);
      }
    
    }
    
    # Report if any were found to be vulnerable.
    if (info)
    {
      if (report_verbosity > 0)
      {
        if (vuln > 1) s = "s of Java are";
        else s = " of Java is";
    
        report =
          '\n' +
          'The following vulnerable instance'+s+' installed on the\n' +
          'remote host :\n' +
          info;
        security_hole(port:0, extra:report);
      }
      else security_hole(0);
      if (granular) exit(0, granular);
    }
    else
    {
      if (granular) exit(0, granular);
    
      installed_versions = substr(installed_versions, 3);
      if (vuln2 > 1)
        exit(0, "The Java "+installed_versions+" installs on the remote host are not affected.");
      else
        exit(0, "The Java "+installed_versions+" install on the remote host is not affected.");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-165.NASL
    descriptionjava-1_7_0-openjdk was updated to icedtea-2.3.6 (bnc#803379) containing various security and bugfixes : - Security fixes - S6563318, CVE-2013-0424: RMI data sanitization - S6664509, CVE-2013-0425: Add logging context - S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time - S6776941: CVE-2013-0427: Improve thread pool shutdown - S7141694, CVE-2013-0429: Improving CORBA internals - S7173145: Improve in-memory representation of splashscreens - S7186945: Unpack200 improvement - S7186946: Refine unpacker resource usage - S7186948: Improve Swing data validation - S7186952, CVE-2013-0432: Improve clipboard access - S7186954: Improve connection performance - S7186957: Improve Pack200 data validation - S7192392, CVE-2013-0443: Better validation of client keys - S7192393, CVE-2013-0440: Better Checking of order of TLS Messages - S7192977, CVE-2013-0442: Issue in toolkit thread - S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies - S7200491: Tighten up JTable layout code - S7200493, CVE-2013-0444: Improve cache handling - S7200499: Better data validation for options - S7200500: Launcher better input validation - S7201064: Better dialogue checking - S7201066, CVE-2013-0441: Change modifiers on unused fields - S7201068, CVE-2013-0435: Better handling of UI elements - S7201070: Serialization to conform to protocol - S7201071, CVE-2013-0433: InetSocketAddress serialization issue - S8000210: Improve JarFile code quality - S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class - S8000539, CVE-2013-0431: Introspect JMX data handling - S8000540, CVE-2013-1475: Improve IIOP type reuse management - S8000631, CVE-2013-1476: Restrict access to class constructor - S8001235, CVE-2013-0434: Improve JAXP HTTP handling - S8001242: Improve RMI HTTP conformance - S8001307: Modify ACC_SUPER behavior - S8001972, CVE-2013-1478: Improve image processing - S8002325, CVE-2013-1480: Improve management of images - Backports - S7057320: test/java/util/concurrent/Executors/AutoShutdown.java failing intermittently - S7083664: TEST_BUG: test hard code of using c:/temp but this dir might not exist - S7107613: scalability blocker in javax.crypto.CryptoPermissions - S7107616: scalability blocker in javax.crypto.JceSecurityManager - S7146424: Wildcard expansion for single entry classpath - S7160609: [macosx] JDK crash in libjvm.dylib ( C [GeForceGLDriver+0x675a] gldAttachDrawable+0x941) - S7160951: [macosx] ActionListener called twice for JMenuItem using ScreenMenuBar - S7162488: VM not printing unknown -XX options - S7169395: Exception throws due to the changes in JDK 7 object tranversal and break backward compatibility - S7175616: Port fix for TimeZone from JDK 8 to JDK 7 - S7176485: (bf) Allow temporary buffer cache to grow to IOV_MAX - S7179908: Fork hs23.3 hsx from hs22.2 for jdk7u7 and reinitialize build number - S7184326: TEST_BUG: java/awt/Frame/7024749/bug7024749.java has a typo - S7185245: Licensee source bundle tries to compile JFR - S7185471: Avoid key expansion when AES cipher is re-init w/ the same key - S7186371: [macosx] Main menu shortcuts not displayed (7u6 regression) - S7187834: [macosx] Usage of private API in macosx 2d implementation causes Apple Store rejection - S7188114: (launcher) need an alternate command line parser for Windows - S7189136: Fork hs23.5 hsx from hs23.4 for jdk7u9 and reinitialize build number - S7189350: Fix failed for CR 7162144 - S7190550: REGRESSION: Some closed/com/oracle/jfr/api tests fail to compile because of fix 7185245 - S7193219: JComboBox serialization fails in JDK 1.7 - S7193977: REGRESSION:Java 7
    last seen2020-06-05
    modified2014-06-13
    plugin id74907
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/74907
    titleopenSUSE Security Update : java-1_7_0-openjdk (openSUSE-SU-2013:0377-1)
  • NASL familyMisc.
    NASL idDOMINO_8_5_3FP5.NASL
    descriptionAccording to its banner, the version of IBM Domino (formerly IBM Lotus Domino) on the remote host is 8.5.x earlier than 8.5.3 FP5. It is, therefore, affected by the following vulnerabilities : - The included version of the IBM Java SDK contains a version of the IBM JRE that contains numerous security issues. (CVE-2013-0809, CVE-2013-1493, CVE-2013-2436, CVE-2013-2455, CVE-2013-3006, CVE-2013-3007, CVE-2013-3008, CVE-2013-3009, CVE-2013-3010, CVE-2013-3011, CVE-2013-3012) - Note also that fixes in the Oracle Java CPUs for February, April and June 2013 are included in the fixed IBM Java release, which is included in the fixed IBM Domino release. (CVE-2012-1541, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0401, CVE-2013-0402, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0431, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0437, CVE-2013-0438, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0444, CVE-2013-0445, CVE-2013-0446, CVE-2013-0448, CVE-2013-0449, CVE-2013-0450, CVE-2013-1473, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478, CVE-2013-1479, CVE-2013-1480, CVE-2013-1481, CVE-2013-1488, CVE-2013-1489, CVE-2013-1491, CVE-2013-1500, CVE-2013-1518, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1561, CVE-2013-1563, CVE-2013-1564, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2400, CVE-2013-2407, CVE-2013-2412, CVE-2013-2414, CVE-2013-2415, CVE-2013-2416, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2425, CVE-2013-2426, CVE-2013-2427, CVE-2013-2428, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431, CVE-2013-2432, CVE-2013-2433, CVE-2013-2434, CVE-2013-2435, CVE-2013-2437, CVE-2013-2438, CVE-2013-2439, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444, CVE-2013-2445, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2449, CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458, CVE-2013-2459, CVE-2013-2460, CVE-2013-2461, CVE-2013-2462, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2467, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473, CVE-2013-3743, CVE-2013-3744, CVE-2013-4002)
    last seen2020-06-01
    modified2020-06-02
    plugin id70742
    published2013-11-04
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70742
    titleIBM Domino 8.5.x < 8.5.3 FP 5 Multiple Vulnerabilities
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2013-0247.NASL
    descriptionFrom Red Hat Security Advisory 2013:0247 : Updated java-1.7.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Software Development Kit. Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, Libraries, and Beans components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428, CVE-2013-0444) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id68728
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68728
    titleOracle Linux 5 / 6 : java-1.7.0-openjdk (ELSA-2013-0247)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0237.NASL
    descriptionUpdated java-1.7.0-oracle packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Oracle Java SE version 7 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update fixes several vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2012-1541, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0431, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0437, CVE-2013-0438, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0444, CVE-2013-0445, CVE-2013-0446, CVE-2013-0448, CVE-2013-0449, CVE-2013-0450, CVE-2013-1473, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478, CVE-2013-1479, CVE-2013-1480, CVE-2013-1489) All users of java-1.7.0-oracle are advised to upgrade to these updated packages, which provide Oracle Java 7 Update 13 and resolve these issues. All running instances of Oracle Java must be restarted for the update to take effect.
    last seen2020-06-01
    modified2020-06-02
    plugin id64468
    published2013-02-05
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64468
    titleRHEL 5 / 6 : java-1.7.0-oracle (RHSA-2013:0237)
  • NASL familyWindows
    NASL idLOTUS_NOTES_8_5_3_FP5.NASL
    descriptionThe remote host has a version of IBM Notes (formerly Lotus Notes) 8.5.x prior to 8.5.3 Fix Pack 5 installed. It is, therefore, reportedly affected by the following vulnerabilities : - The included version of the IBM Java SDK contains a version of the IBM JRE that contains numerous security issues. (CVE-2013-0809, CVE-2013-1493, CVE-2013-2436, CVE-2013-2455, CVE-2013-3006, CVE-2013-3007, CVE-2013-3008, CVE-2013-3009, CVE-2013-3010, CVE-2013-3011, CVE-2013-3012) - Note also that fixes in the Oracle Java CPUs for February, April and June 2013 are included in the fixed IBM Java release, which is included in the fixed IBM Notes release. (CVE-2012-1541, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0401, CVE-2013-0402, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0431, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0437, CVE-2013-0438, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0444, CVE-2013-0445, CVE-2013-0446, CVE-2013-0448, CVE-2013-0449, CVE-2013-0450, CVE-2013-1473, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478, CVE-2013-1479, CVE-2013-1480, CVE-2013-1481, CVE-2013-1488, CVE-2013-1489, CVE-2013-1491, CVE-2013-1500, CVE-2013-1518, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1561, CVE-2013-1563, CVE-2013-1564, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2400, CVE-2013-2407, CVE-2013-2412, CVE-2013-2414, CVE-2013-2415, CVE-2013-2416, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2425, CVE-2013-2426, CVE-2013-2427, CVE-2013-2428, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431, CVE-2013-2432, CVE-2013-2433, CVE-2013-2434, CVE-2013-2435, CVE-2013-2437, CVE-2013-2438, CVE-2013-2439, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444, CVE-2013-2445, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2449, CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458, CVE-2013-2459, CVE-2013-2460, CVE-2013-2461, CVE-2013-2462, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2467, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473, CVE-2013-3743, CVE-2013-3744, CVE-2013-4002)
    last seen2020-06-01
    modified2020-06-02
    plugin id70744
    published2013-11-04
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70744
    titleIBM Notes 8.5.x < 8.5.3 FP5 Multiple Vulnerabilities
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2013-010.NASL
    descriptionMultiple security issues were identified and fixed in OpenJDK (icedtea6) : - S6563318, CVE-2013-0424: RMI data sanitization - S6664509, CVE-2013-0425: Add logging context - S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time - S6776941: CVE-2013-0427: Improve thread pool shutdown - S7141694, CVE-2013-0429: Improving CORBA internals - S7173145: Improve in-memory representation of splashscreens - S7186945: Unpack200 improvement - S7186946: Refine unpacker resource usage - S7186948: Improve Swing data validation - S7186952, CVE-2013-0432: Improve clipboard access - S7186954: Improve connection performance - S7186957: Improve Pack200 data validation - S7192392, CVE-2013-0443: Better validation of client keys - S7192393, CVE-2013-0440: Better Checking of order of TLS Messages - S7192977, CVE-2013-0442: Issue in toolkit thread - S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies - S7200491: Tighten up JTable layout code - S7200500: Launcher better input validation - S7201064: Better dialogue checking - S7201066, CVE-2013-0441: Change modifiers on unused fields - S7201068, CVE-2013-0435: Better handling of UI elements - S7201070: Serialization to conform to protocol - S7201071, CVE-2013-0433: InetSocketAddress serialization issue - S8000210: Improve JarFile code quality - S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class - S8000540, CVE-2013-1475: Improve IIOP type reuse management - S8000631, CVE-2013-1476: Restrict access to class constructor - S8001235, CVE-2013-0434: Improve JAXP HTTP handling - S8001242: Improve RMI HTTP conformance - S8001307: Modify ACC_SUPER behavior - S8001972, CVE-2013-1478: Improve image processing - S8002325, CVE-2013-1480: Improve management of images - Backports - S7010849: 5/5 Extraneous javac source/target options when building sa-jdi The updated packages provides icedtea6-1.11.6 which is not vulnerable to these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id64563
    published2013-02-12
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64563
    titleMandriva Linux Security Advisory : java-1.6.0-openjdk (MDVSA-2013:010)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-2209.NASL
    descriptionThe update contains the following security fixes : - S6563318, CVE-2013-0424: RMI data sanitization - S6664509, CVE-2013-0425: Add logging context - S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time - S6776941: CVE-2013-0427: Improve thread pool shutdown - S7141694, CVE-2013-0429: Improving CORBA internals - S7173145: Improve in-memory representation of splashscreens - S7186945: Unpack200 improvement - S7186946: Refine unpacker resource usage - S7186948: Improve Swing data validation - S7186952, CVE-2013-0432: Improve clipboard access - S7186954: Improve connection performance - S7186957: Improve Pack200 data validation - S7192392, CVE-2013-0443: Better validation of client keys - S7192393, CVE-2013-0440: Better Checking of order of TLS Messages - S7192977, CVE-2013-0442: Issue in toolkit thread - S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies - S7200491: Tighten up JTable layout code - S7200500: Launcher better input validation - S7201064: Better dialogue checking - S7201066, CVE-2013-0441: Change modifiers on unused fields - S7201068, CVE-2013-0435: Better handling of UI elements - S7201070: Serialization to conform to protocol - S7201071, CVE-2013-0433: InetSocketAddress serialization issue - S8000210: Improve JarFile code quality - S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class - S8000540, CVE-2013-1475: Improve IIOP type reuse management - S8000631, CVE-2013-1476: Restrict access to class constructor - S8001235, CVE-2013-0434: Improve JAXP HTTP handling - S8001242: Improve RMI HTTP conformance - S8001307: Modify ACC_SUPER behavior - S8001972, CVE-2013-1478: Improve image processing - S8002325, CVE-2013-1480: Improve management of images This update backs out two of the recent security fixes (664509 and 7201064) that caused severe regressions. This update backs out two of the recent security fixes (664509 and 7201064) that caused severe regressions. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-02-11
    plugin id64550
    published2013-02-11
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64550
    titleFedora 17 : java-1.7.0-openjdk-1.7.0.9-2.3.5.3.fc17 (2013-2209)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-2197.NASL
    descriptionThis is rebuild of java-1.6.0-openjdk-1.6.0.0-69.1.11.6.fc16 with removed 7201064 and added 8005615 so : kept rewritten java-1.6.0-openjdk-java-access-bridgesecurity.patch kept icedtea6 1.11.6 Security fixes: S8005615, fix for S6664509 S6563318, CVE-2013-0424: RMI data sanitization S6664509, CVE-2013-0425: Add logging context S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time S6776941: CVE-2013-0427: Improve thread pool shutdown S7141694, CVE-2013-0429: Improving CORBA internals S7173145: Improve in-memory representation of splashscreens S7186945: Unpack200 improvement S7186946: Refine unpacker resource usage S7186948: Improve Swing data validation S7186952, CVE-2013-0432: Improve clipboard access S7186954: Improve connection performance S7186957: Improve Pack200 data validation S7192392, CVE-2013-0443: Better validation of client keys S7192393, CVE-2013-0440: Better Checking of order of TLS Messages S7192977, CVE-2013-0442: Issue in toolkit thread S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies S7200491: Tighten up JTable layout code S7200500: Launcher better input validation S7201066, CVE-2013-0441: Change modifiers on unused fields S7201068, CVE-2013-0435: Better handling of UI elements S7201070: Serialization to conform to protocol S7201071, CVE-2013-0433: InetSocketAddress serialization issue S8000210: Improve JarFile code quality S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class S8000540, CVE-2013-1475: Improve IIOP type reuse management S8000631, CVE-2013-1476: Restrict access to class constructor S8001235, CVE-2013-0434: Improve JAXP HTTP handling S8001242: Improve RMI HTTP conformance S8001307: Modify ACC_SUPER behavior S8001972, CVE-2013-1478: Improve image processing S8002325, CVE-2013-1480: Improve management of images Backports S7010849: 5/5 Extraneous javac source/target options when building sa-jdi Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-02-11
    plugin id64548
    published2013-02-11
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64548
    titleFedora 16 : java-1.6.0-openjdk-1.6.0.0-71.1.11.6.fc16 (2013-2197)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2013-0245.NASL
    descriptionUpdated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id64536
    published2013-02-11
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64536
    titleCentOS 6 : java-1.6.0-openjdk (CESA-2013:0245)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20130208_JAVA_1_6_0_OPENJDK_ON_SL5_X.NASL
    descriptionMultiple improper permission check issues were discovered in the AWT, CORBA, JMX, and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-03-18
    modified2013-02-10
    plugin id64521
    published2013-02-10
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64521
    titleScientific Linux Security Update : java-1.6.0-openjdk on SL5.x i386/x86_64 (20130208)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2013-0247.NASL
    descriptionUpdated java-1.7.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Software Development Kit. Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, Libraries, and Beans components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428, CVE-2013-0444) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id64537
    published2013-02-11
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64537
    titleCentOS 5 / 6 : java-1.7.0-openjdk (CESA-2013:0247)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0247.NASL
    descriptionUpdated java-1.7.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Software Development Kit. Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, Libraries, and Beans components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428, CVE-2013-0444) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id64520
    published2013-02-10
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64520
    titleRHEL 5 / 6 : java-1.7.0-openjdk (RHSA-2013:0247)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2013-0246.NASL
    descriptionUpdated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id64512
    published2013-02-10
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64512
    titleCentOS 5 : java-1.6.0-openjdk (CESA-2013:0246)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_JAVA-1_6_0-OPENJDK-130212.NASL
    descriptionjava-1_6_0-openjdk based on Icedtea6-1.12.2 was released, fixing various security issues : New in release 1.12.2 (2012-02-03) : - Security fixes - S6563318, CVE-2013-0424: RMI data sanitization - S6664509, CVE-2013-0425: Add logging context - S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time - S6776941: CVE-2013-0427: Improve thread pool shutdown - S7141694, CVE-2013-0429: Improving CORBA internals - S7173145: Improve in-memory representation of splashscreens - S7186945: Unpack200 improvement - S7186946: Refine unpacker resource usage - S7186948: Improve Swing data validation - S7186952, CVE-2013-0432: Improve clipboard access - S7186954: Improve connection performance - S7186957: Improve Pack200 data validation - S7192392, CVE-2013-0443: Better validation of client keys - S7192393, CVE-2013-0440: Better Checking of order of TLS Messages - S7192977, CVE-2013-0442: Issue in toolkit thread - S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies - S7200491: Tighten up JTable layout code - S7200500: Launcher better input validation - S7201064: Better dialogue checking - S7201066, CVE-2013-0441: Change modifiers on unused fields - S7201068, CVE-2013-0435: Better handling of UI elements - S7201070: Serialization to conform to protocol - S7201071, CVE-2013-0433: InetSocketAddress serialization issue - S8000210: Improve JarFile code quality - S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class - S8000540, CVE-2013-1475: Improve IIOP type reuse management - S8000631, CVE-2013-1476: Restrict access to class constructor - S8001235, CVE-2013-0434: Improve JAXP HTTP handling - S8001242: Improve RMI HTTP conformance - S8001307: Modify ACC_SUPER behavior - S8001972, CVE-2013-1478: Improve image processing - S8002325, CVE-2013-1480: Improve management of images - Backports - S7010849: 5/5 Extraneous javac source/target options when building sa-jdi - S8004341: Two JCK tests fails with 7u11 b06 - S8005615: Java Logger fails to load tomcat logger implementation (JULI) - Bug fixes - PR1297: cacao and jamvm parallel unpack failures - PR1301: PR1171 causes builds of Zero to fail
    last seen2020-06-05
    modified2013-02-21
    plugin id64780
    published2013-02-21
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64780
    titleSuSE 11.2 Security Update : Java 1.6.0 (SAT Patch Number 7332)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-2205.NASL
    descriptionThe update contains the following security fixes : - S6563318, CVE-2013-0424: RMI data sanitization - S6664509, CVE-2013-0425: Add logging context - S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time - S6776941: CVE-2013-0427: Improve thread pool shutdown - S7141694, CVE-2013-0429: Improving CORBA internals - S7173145: Improve in-memory representation of splashscreens - S7186945: Unpack200 improvement - S7186946: Refine unpacker resource usage - S7186948: Improve Swing data validation - S7186952, CVE-2013-0432: Improve clipboard access - S7186954: Improve connection performance - S7186957: Improve Pack200 data validation - S7192392, CVE-2013-0443: Better validation of client keys - S7192393, CVE-2013-0440: Better Checking of order of TLS Messages - S7192977, CVE-2013-0442: Issue in toolkit thread - S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies - S7200491: Tighten up JTable layout code - S7200500: Launcher better input validation - S7201064: Better dialogue checking - S7201066, CVE-2013-0441: Change modifiers on unused fields - S7201068, CVE-2013-0435: Better handling of UI elements - S7201070: Serialization to conform to protocol - S7201071, CVE-2013-0433: InetSocketAddress serialization issue - S8000210: Improve JarFile code quality - S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class - S8000540, CVE-2013-1475: Improve IIOP type reuse management - S8000631, CVE-2013-1476: Restrict access to class constructor - S8001235, CVE-2013-0434: Improve JAXP HTTP handling - S8001242: Improve RMI HTTP conformance - S8001307: Modify ACC_SUPER behavior - S8001972, CVE-2013-1478: Improve image processing - S8002325, CVE-2013-1480: Improve management of images This update backs out two of the recent security fixes (664509 and 7201064) that caused severe regressions. This update backs out two of the recent security fixes (664509 and 7201064) that caused severe regressions. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-02-11
    plugin id64549
    published2013-02-11
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64549
    titleFedora 18 : java-1.7.0-openjdk-1.7.0.9-2.3.5.3.fc18 (2013-2205)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1724-1.NASL
    descriptionSeveral vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to cause a denial of service. (CVE-2012-1541, CVE-2012-3342, CVE-2013-0351, CVE-2013-0419, CVE-2013-0423, CVE-2013-0446, CVE-2012-3213, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0441, CVE-2013-0442, CVE-2013-0445, CVE-2013-0450, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478, CVE-2013-1480) Vulnerabilities were discovered in the OpenJDK JRE related to information disclosure. (CVE-2013-0409, CVE-2013-0434, CVE-2013-0438) Several data integrity vulnerabilities were discovered in the OpenJDK JRE. (CVE-2013-0424, CVE-2013-0427, CVE-2013-0433, CVE-2013-1473) Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. (CVE-2013-0432, CVE-2013-0435, CVE-2013-0443) A vulnerability was discovered in the OpenJDK JRE related to availability. An attacker could exploit this to cause a denial of service. (CVE-2013-0440) A vulnerability was discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit this to cause a denial of service. This issue only affected Ubuntu 12.10. (CVE-2013-0444) A data integrity vulnerability was discovered in the OpenJDK JRE. This issue only affected Ubuntu 12.10. (CVE-2013-0448) An information disclosure vulnerability was discovered in the OpenJDK JRE. This issue only affected Ubuntu 12.10. (CVE-2013-0449) A vulnerability was discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit this to cause a denial of service. This issue did not affect Ubuntu 12.10. (CVE-2013-1481). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id64639
    published2013-02-15
    reporterUbuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64639
    titleUbuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : openjdk-6, openjdk-7 vulnerabilities (USN-1724-1)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2013-0246.NASL
    descriptionFrom Red Hat Security Advisory 2013:0246 : Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id68727
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68727
    titleOracle Linux 5 : java-1.6.0-openjdk (ELSA-2013-0246)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20130205_JDK_1_6_0_ON_SL_5_0.NASL
    descriptionMultiple fixes. (CVE-2012-1541, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445, CVE-2013-0446, CVE-2013-0450, CVE-2013-1473, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478, CVE-2013-1480, CVE-2013-1481) As a reminder, the closed source Java6 packages are not present in Scientific Linux 5.9. Public updates to the closed source package are being discontinued by upstream. Scientific Linux 6 has never included the closed source Java packages. http://www.oracle.com/technetwork/java/eol-135779.html All running instances of Java must be restarted for the update to take effect.
    last seen2020-03-18
    modified2013-02-13
    plugin id64605
    published2013-02-13
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64605
    titleScientific Linux Security Update : jdk-1.6.0 on SL 5.0 - 5.8 (i386 x86_64) (20130205)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201406-32.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201406-32 (IcedTea JDK: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in the IcedTea JDK. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, bypass intended security policies, or have other unspecified impact. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id76303
    published2014-06-30
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/76303
    titleGLSA-201406-32 : IcedTea JDK: Multiple vulnerabilities (BEAST) (ROBOT)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0246.NASL
    descriptionUpdated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id64519
    published2013-02-10
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64519
    titleRHEL 5 : java-1.6.0-openjdk (RHSA-2013:0246)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0236.NASL
    descriptionUpdated java-1.6.0-sun packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Oracle Java SE version 6 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update fixes several vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2012-1541, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445, CVE-2013-0446, CVE-2013-0450, CVE-2013-1473, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478, CVE-2013-1480, CVE-2013-1481) All users of java-1.6.0-sun are advised to upgrade to these updated packages, which provide Oracle Java 6 Update 39. All running instances of Oracle Java must be restarted for the update to take effect.
    last seen2020-06-01
    modified2020-06-02
    plugin id64467
    published2013-02-05
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64467
    titleRHEL 5 / 6 : java-1.6.0-sun (RHSA-2013:0236)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2013-156.NASL
    descriptionMultiple improper permission check issues were discovered in the AWT, CORBA, JMX, Libraries, and Beans components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442 , CVE-2013-0445 , CVE-2013-0441 , CVE-2013-1475 , CVE-2013-1476 , CVE-2013-0429 , CVE-2013-0450 , CVE-2013-0425 , CVE-2013-0426 , CVE-2013-0428 , CVE-2013-0444) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478 , CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id69715
    published2013-09-04
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69715
    titleAmazon Linux AMI : java-1.7.0-openjdk (ALAS-2013-156)
  • NASL familyWindows
    NASL idORACLE_JAVA_CPU_FEB_2013.NASL
    descriptionThe version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier than 7 Update 13 or 6 Update 39, or is earlier than or equal to 5 Update 38 or 1.4.2 Update 40. It is, therefore, potentially affected by security issues in the following components : - 2D - AWT - Beans - CORBA - Deployment - Install - JavaFX - JAXP - JAX-WS - JMX - JSSE - Libraries - Networking - RMI - Scripting - Sound
    last seen2020-06-01
    modified2020-06-02
    plugin id64454
    published2013-02-04
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64454
    titleOracle Java SE Multiple Vulnerabilities (February 2013 CPU)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2013-095.NASL
    descriptionUpdated java-1.7.0-openjdk packages fix security vulnerabilities : Two improper permission check issues were discovered in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions (CVE-2012-3174, CVE-2013-0422). Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, Libraries, and Beans components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428, CVE-2013-0444). Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges (CVE-2013-1478, CVE-2013-1480). A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id66107
    published2013-04-20
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/66107
    titleMandriva Linux Security Advisory : java-1.7.0-openjdk (MDVSA-2013:095)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2013-0245.NASL
    descriptionFrom Red Hat Security Advisory 2013:0245 : Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-06-01
    modified2020-06-02
    plugin id68726
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68726
    titleOracle Linux 6 : java-1.6.0-openjdk (ELSA-2013-0245)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20130208_JAVA_1_7_0_OPENJDK_ON_SL5_X.NASL
    descriptionMultiple improper permission check issues were discovered in the AWT, CORBA, JMX, Libraries, and Beans components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428, CVE-2013-0444) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-03-18
    modified2013-02-10
    plugin id64523
    published2013-02-10
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64523
    titleScientific Linux Security Update : java-1.7.0-openjdk on SL5.x, SL6.x i386/x86_64 (20130208)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-2188.NASL
    descriptionThe update contains the following security fixes : - S6563318, CVE-2013-0424: RMI data sanitization - S6664509, CVE-2013-0425: Add logging context - S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time - S6776941: CVE-2013-0427: Improve thread pool shutdown - S7141694, CVE-2013-0429: Improving CORBA internals - S7173145: Improve in-memory representation of splashscreens - S7186945: Unpack200 improvement - S7186946: Refine unpacker resource usage - S7186948: Improve Swing data validation - S7186952, CVE-2013-0432: Improve clipboard access - S7186954: Improve connection performance - S7186957: Improve Pack200 data validation - S7192392, CVE-2013-0443: Better validation of client keys - S7192393, CVE-2013-0440: Better Checking of order of TLS Messages - S7192977, CVE-2013-0442: Issue in toolkit thread - S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies - S7200491: Tighten up JTable layout code - S7200500: Launcher better input validation - S7201064: Better dialogue checking - S7201066, CVE-2013-0441: Change modifiers on unused fields - S7201068, CVE-2013-0435: Better handling of UI elements - S7201070: Serialization to conform to protocol - S7201071, CVE-2013-0433: InetSocketAddress serialization issue - S8000210: Improve JarFile code quality - S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class - S8000540, CVE-2013-1475: Improve IIOP type reuse management - S8000631, CVE-2013-1476: Restrict access to class constructor - S8001235, CVE-2013-0434: Improve JAXP HTTP handling - S8001242: Improve RMI HTTP conformance - S8001307: Modify ACC_SUPER behavior - S8001972, CVE-2013-1478: Improve image processing - S8002325, CVE-2013-1480: Improve management of images This update backs out two of the recent security fixes (664509 and 7201064) that caused severe regressions. This update backs out two of the recent security fixes (664509 and 7201064) that caused severe regressions. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-02-11
    plugin id64547
    published2013-02-11
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64547
    titleFedora 16 : java-1.7.0-openjdk-1.7.0.9-2.3.5.3.fc16 (2013-2188)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_JAVA_2013-001.NASL
    descriptionThe remote Mac OS X 10.7 or 10.8 host has a Java runtime that is missing the Java for OS X 2013-001 update, which updates the Java version to 1.6.0_41. It is, therefore, affected by several security vulnerabilities, the most serious of which may allow an untrusted Java applet to execute arbitrary code with the privileges of the current user outside the Java sandbox.
    last seen2019-10-28
    modified2013-02-20
    plugin id64700
    published2013-02-20
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64700
    titleMac OS X : Java for OS X 2013-001
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-1898.NASL
    description - Rewritten java-1.6.0-openjdk-java-access-bridge-security.patch - Updated to icedtea6 1.11.6 - Security fixes - S6563318, CVE-2013-0424: RMI data sanitization - S6664509, CVE-2013-0425: Add logging context - S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time - S6776941: CVE-2013-0427: Improve thread pool shutdown - S7141694, CVE-2013-0429: Improving CORBA internals - S7173145: Improve in-memory representation of splashscreens - S7186945: Unpack200 improvement - S7186946: Refine unpacker resource usage - S7186948: Improve Swing data validation - S7186952, CVE-2013-0432: Improve clipboard access - S7186954: Improve connection performance - S7186957: Improve Pack200 data validation - S7192392, CVE-2013-0443: Better validation of client keys - S7192393, CVE-2013-0440: Better Checking of order of TLS Messages - S7192977, CVE-2013-0442: Issue in toolkit thread - S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies - S7200491: Tighten up JTable layout code - S7200500: Launcher better input validation - S7201064: Better dialogue checking - S7201066, CVE-2013-0441: Change modifiers on unused fields - S7201068, CVE-2013-0435: Better handling of UI elements - S7201070: Serialization to conform to protocol - S7201071, CVE-2013-0433: InetSocketAddress serialization issue - S8000210: Improve JarFile code quality - S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class - S8000540, CVE-2013-1475: Improve IIOP type reuse management - S8000631, CVE-2013-1476: Restrict access to class constructor - S8001235, CVE-2013-0434: Improve JAXP HTTP handling - S8001242: Improve RMI HTTP conformance - S8001307: Modify ACC_SUPER behavior - S8001972, CVE-2013-1478: Improve image processing - S8002325, CVE-2013-1480: Improve management of images - Backports - S7010849: 5/5 Extraneous javac source/target options when building sa-jdi Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-02-06
    plugin id64478
    published2013-02-06
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64478
    titleFedora 16 : java-1.6.0-openjdk-1.6.0.0-69.1.11.6.fc16 (2013-1898)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20130208_JAVA_1_6_0_OPENJDK_ON_SL6_X.NASL
    descriptionMultiple improper permission check issues were discovered in the AWT, CORBA, JMX, and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428) Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480) A flaw was found in the AWT component
    last seen2020-03-18
    modified2013-02-10
    plugin id64522
    published2013-02-10
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64522
    titleScientific Linux Security Update : java-1.6.0-openjdk on SL6.x i386/x86_64 (20130208)

Oval

  • accepted2015-03-23T04:00:54.928-04:00
    classvulnerability
    contributors
    • nameSergey Artykhov
      organizationALTX-SOFT
    • nameMaria Mikhno
      organizationALTX-SOFT
    definition_extensions
    • commentJava SE Runtime Environment 5 is installed
      ovaloval:org.mitre.oval:def:15748
    • commentJava SE Runtime Environment 6 is installed
      ovaloval:org.mitre.oval:def:16362
    • commentJava SE Runtime Environment 7 is installed
      ovaloval:org.mitre.oval:def:16050
    descriptionUnspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
    familywindows
    idoval:org.mitre.oval:def:16649
    statusaccepted
    submitted2013-04-22T10:26:26.748+04:00
    titleUnspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE (subcomponent: CORBA) 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
    version9
  • accepted2015-04-20T04:01:06.955-04:00
    classvulnerability
    contributors
    • nameGanesh Manal
      organizationHewlett-Packard
    • nameSushant Kumar Singh
      organizationHewlett-Packard
    • nameSushant Kumar Singh
      organizationHewlett-Packard
    • namePrashant Kumar
      organizationHewlett-Packard
    • nameMike Cokus
      organizationThe MITRE Corporation
    descriptionUnspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
    familyunix
    idoval:org.mitre.oval:def:19300
    statusaccepted
    submitted2013-11-22T11:43:28.000-05:00
    titleHP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
    version50
  • accepted2015-04-20T04:01:09.653-04:00
    classvulnerability
    contributors
    • nameGanesh Manal
      organizationHewlett-Packard
    • nameSushant Kumar Singh
      organizationHewlett-Packard
    • nameSushant Kumar Singh
      organizationHewlett-Packard
    • namePrashant Kumar
      organizationHewlett-Packard
    • nameMike Cokus
      organizationThe MITRE Corporation
    descriptionUnspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
    familyunix
    idoval:org.mitre.oval:def:19342
    statusaccepted
    submitted2013-11-22T11:43:28.000-05:00
    titleHP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
    version52
  • accepted2015-04-20T04:01:18.806-04:00
    classvulnerability
    contributors
    • nameGanesh Manal
      organizationHewlett-Packard
    • nameSushant Kumar Singh
      organizationHewlett-Packard
    • namePrashant Kumar
      organizationHewlett-Packard
    • nameMike Cokus
      organizationThe MITRE Corporation
    descriptionUnspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
    familyunix
    idoval:org.mitre.oval:def:19457
    statusaccepted
    submitted2013-11-22T11:43:28.000-05:00
    titleHP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
    version47

Redhat

advisories
  • rhsa
    idRHSA-2013:0236
  • rhsa
    idRHSA-2013:0237
  • rhsa
    idRHSA-2013:0245
  • rhsa
    idRHSA-2013:0246
  • rhsa
    idRHSA-2013:0247
rpms
  • java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3
  • java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9
  • java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3
  • java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9
  • java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3
  • java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9
  • java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3
  • java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9
  • java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3
  • java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9
  • java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3
  • java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9
  • java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9
  • java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3
  • java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9
  • java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3
  • java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9
  • java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3
  • java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9
  • java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3
  • java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9
  • java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3
  • java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9
  • java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3
  • java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3
  • java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3
  • java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3
  • java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3
  • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3
  • java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3
  • java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9
  • java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9
  • java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9
  • java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9
  • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9
  • java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9
  • java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9
  • java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3
  • java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9
  • java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3
  • java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9
  • java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3
  • java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9
  • java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3
  • java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9
  • java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3
  • java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9
  • java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3

References