Vulnerabilities > CVE-2014-6466 - Unspecified vulnerability in Oracle JDK and JRE

047910
CVSS 6.9 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
oracle
nessus

Summary

Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Internet Explorer, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.

Vulnerable Configurations

Part Description Count
Application
Oracle
5

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201502-12.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201502-12 (Oracle JRE/JDK: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Oracle’s Java SE Development Kit and Runtime Environment. Please review the CVE identifiers referenced below for details. Impact : A context-dependent attacker may be able to execute arbitrary code, disclose, update, insert, or delete certain data. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id81370
    published2015-02-16
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81370
    titleGLSA-201502-12 : Oracle JRE/JDK: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201502-12.
    #
    # The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(81370);
      script_version("1.4");
      script_cvs_date("Date: 2019/08/12 17:35:38");
    
      script_cve_id("CVE-2014-0429", "CVE-2014-0432", "CVE-2014-0446", "CVE-2014-0448", "CVE-2014-0449", "CVE-2014-0451", "CVE-2014-0452", "CVE-2014-0453", "CVE-2014-0454", "CVE-2014-0455", "CVE-2014-0456", "CVE-2014-0457", "CVE-2014-0458", "CVE-2014-0459", "CVE-2014-0460", "CVE-2014-0461", "CVE-2014-0463", "CVE-2014-0464", "CVE-2014-2397", "CVE-2014-2398", "CVE-2014-2401", "CVE-2014-2402", "CVE-2014-2403", "CVE-2014-2409", "CVE-2014-2410", "CVE-2014-2412", "CVE-2014-2413", "CVE-2014-2414", "CVE-2014-2420", "CVE-2014-2421", "CVE-2014-2422", "CVE-2014-2423", "CVE-2014-2427", "CVE-2014-2428", "CVE-2014-2483", "CVE-2014-2490", "CVE-2014-4208", "CVE-2014-4209", "CVE-2014-4216", "CVE-2014-4218", "CVE-2014-4219", "CVE-2014-4220", "CVE-2014-4221", "CVE-2014-4223", "CVE-2014-4227", "CVE-2014-4244", "CVE-2014-4247", "CVE-2014-4252", "CVE-2014-4262", "CVE-2014-4263", "CVE-2014-4264", "CVE-2014-4265", "CVE-2014-4266", "CVE-2014-4268", "CVE-2014-4288", "CVE-2014-6456", "CVE-2014-6457", "CVE-2014-6458", "CVE-2014-6466", "CVE-2014-6468", "CVE-2014-6476", "CVE-2014-6485", "CVE-2014-6492", "CVE-2014-6493", "CVE-2014-6502", "CVE-2014-6503", "CVE-2014-6504", "CVE-2014-6506", "CVE-2014-6511", "CVE-2014-6512", "CVE-2014-6513", "CVE-2014-6515", "CVE-2014-6517", "CVE-2014-6519", "CVE-2014-6527", "CVE-2014-6531", "CVE-2014-6532", "CVE-2014-6558", "CVE-2014-6562");
      script_bugtraq_id(66856, 66866, 66870, 66873, 66877, 66879, 66881, 66883, 66886, 66887, 66891, 66893, 66894, 66897, 66898, 66899, 66902, 66903, 66904, 66905, 66907, 66908, 66909, 66910, 66911, 66912, 66913, 66914, 66915, 66916, 66917, 66918, 66919, 66920, 68562, 68571, 68576, 68580, 68583, 68590, 68596, 68599, 68603, 68608, 68612, 68615, 68620, 68624, 68626, 68632, 68636, 68639, 68642, 68645, 70456, 70460, 70468, 70470, 70484, 70488, 70507, 70518, 70519, 70522, 70523, 70531, 70533, 70538, 70544, 70548, 70552, 70556, 70560, 70564, 70565, 70567, 70569, 70570, 70572);
      script_xref(name:"GLSA", value:"201502-12");
    
      script_name(english:"GLSA-201502-12 : Oracle JRE/JDK: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201502-12
    (Oracle JRE/JDK: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in Oracle’s Java SE
          Development Kit and Runtime Environment. Please review the CVE
          identifiers referenced below for details.
      
    Impact :
    
        A context-dependent attacker may be able to execute arbitrary code,
          disclose, update, insert, or delete certain data.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201502-12"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Oracle JRE 1.7 users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose
          '>=dev-java/oracle-jre-bin-1.7.0.71'
        All Oracle JDK 1.7 users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose
          '>=dev-java/oracle-jdk-bin-1.7.0.71'
        All users of the precompiled 32-bit Oracle JRE should upgrade to the
          latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose
          '>=app-emulation/emul-linux-x86-java-1.7.0.71'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:emul-linux-x86-java");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:oracle-jdk-bin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:oracle-jre-bin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/04/15");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/02/15");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/02/16");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"dev-java/oracle-jre-bin", unaffected:make_list("ge 1.7.0.71"), vulnerable:make_list("lt 1.7.0.71"))) flag++;
    if (qpkg_check(package:"dev-java/oracle-jdk-bin", unaffected:make_list("ge 1.7.0.71"), vulnerable:make_list("lt 1.7.0.71"))) flag++;
    if (qpkg_check(package:"app-emulation/emul-linux-x86-java", unaffected:make_list("ge 1.7.0.71"), vulnerable:make_list("lt 1.7.0.71"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Oracle JRE/JDK");
    }
    
  • NASL familyWindows
    NASL idORACLE_JAVA_CPU_OCT_2014.NASL
    descriptionThe version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8 Update 25, 7 Update 71, 6 Update 85, or 5 Update 75. It is, therefore, affected by security issues in the following components : - 2D - AWT - Deployment - Hotspot - JAXP - JSSE - JavaFX - Libraries - Security
    last seen2020-06-01
    modified2020-06-02
    plugin id78481
    published2014-10-15
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/78481
    titleOracle Java SE Multiple Vulnerabilities (October 2014 CPU)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(78481);
      script_version("1.10");
      script_cvs_date("Date: 2018/11/15 20:50:28");
    
      script_cve_id(
        "CVE-2014-4288",
        "CVE-2014-6456",
        "CVE-2014-6457",
        "CVE-2014-6458",
        "CVE-2014-6466",
        "CVE-2014-6468",
        "CVE-2014-6476",
        "CVE-2014-6485",
        "CVE-2014-6492",
        "CVE-2014-6493",
        "CVE-2014-6502",
        "CVE-2014-6503",
        "CVE-2014-6504",
        "CVE-2014-6506",
        "CVE-2014-6511",
        "CVE-2014-6512",
        "CVE-2014-6513",
        "CVE-2014-6515",
        "CVE-2014-6517",
        "CVE-2014-6519",
        "CVE-2014-6527",
        "CVE-2014-6531",
        "CVE-2014-6532",
        "CVE-2014-6558",
        "CVE-2014-6562"
      );
      script_bugtraq_id(
        70456,
        70460,
        70468,
        70470,
        70484,
        70488,
        70507,
        70518,
        70519,
        70522,
        70523,
        70531,
        70533,
        70538,
        70544,
        70548,
        70552,
        70556,
        70560,
        70564,
        70565,
        70567,
        70569,
        70570,
        70572
      );
    
      script_name(english:"Oracle Java SE Multiple Vulnerabilities (October 2014 CPU)");
      script_summary(english:"Checks the version of the JRE.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host contains a programming platform that is
    affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Oracle (formerly Sun) Java SE or Java for Business
    installed on the remote host is prior to 8 Update 25, 7 Update 71, 6
    Update 85, or 5 Update 75. It is, therefore, affected by security
    issues in the following components :
    
      - 2D
      - AWT
      - Deployment
      - Hotspot
      - JAXP
      - JSSE
      - JavaFX
      - Libraries
      - Security");
      # https://www.oracle.com/technetwork/topics/security/alerts-086861.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2b7fdf57");
      # Java SE JDK and JRE 8 Update 25
      # https://www.oracle.com/technetwork/java/javase/8u25-relnotes-2296185.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?631ebd82");
      # Java SE JDK and JRE 7 Update 71
      # https://www.oracle.com/technetwork/java/javase/7u71-relnotes-2296187.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?cd6e3a16");
      # Java SE JDK and JRE 6 Update 85
      # http://www.oracle.com/technetwork/java/javase/documentation/overview-156328.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?726f7054");
      # Java SE JDK and JRE 5.0 Update 75
      # http://www.oracle.com/technetwork/java/javase/documentation/overview-137139.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?84f3023c");
      script_set_attribute(attribute:"solution", value:
    "Update to JDK / JRE 8 Update 25, 7 Update 71, 6 Update 85, or 5 Update
    75 or later and, if necessary, remove any affected versions.
    
    Note that an Extended Support contract with Oracle is needed to obtain
    JDK / JRE 5 Update 75 or later or 6 Update 85 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/10/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/10/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/15");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:jre");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:jdk");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("sun_java_jre_installed.nasl");
      script_require_keys("SMB/Java/JRE/Installed");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    # Check each installed JRE.
    installs = get_kb_list_or_exit("SMB/Java/JRE/*");
    
    info = "";
    vuln = 0;
    installed_versions = "";
    
    foreach install (list_uniq(keys(installs)))
    {
      ver = install - "SMB/Java/JRE/";
      if (ver !~ "^[0-9.]+") continue;
    
      installed_versions = installed_versions + " & " + ver;
    
      # Fixes : (JDK|JRE) 8 Update 25 / 7 Update 71 / 6 Update 85 / 5 Update 75
      if (
        ver =~ '^1\\.5\\.0_(0?[0-9]|[0-6][0-9]|7[0-4])([^0-9]|$)' ||
        ver =~ '^1\\.6\\.0_(0?[0-9]|[0-7][0-9]|8[0-4])([^0-9]|$)' ||
        ver =~ '^1\\.7\\.0_(0?[0-9]|[0-6][0-9]|70)([^0-9]|$)'     ||
        ver =~ '^1\\.8\\.0_(0?[0-9]|1[0-9]|2[0-4])([^0-9]|$)'
      )
      {
        dirs = make_list(get_kb_list(install));
        vuln += max_index(dirs);
    
        foreach dir (dirs)
          info += '\n  Path              : ' + dir;
    
        info += '\n  Installed version : ' + ver;
        info += '\n  Fixed versions    : 1.5.0_75 / 1.6.0_85 / 1.7.0_71 / 1.8.0_25\n';
      }
    }
    
    # Report if any were found to be vulnerable.
    if (info)
    {
      port = get_kb_item("SMB/transport");
      if (!port) port = 445;
    
      if (report_verbosity > 0)
      {
        if (vuln > 1) s = "s of Java are";
        else s = " of Java is";
    
        report =
          '\n' +
          'The following vulnerable instance'+s+' installed on the\n' +
          'remote host :\n' +
          info;
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }
    else
    {
      installed_versions = substr(installed_versions, 3);
      if (" & " >< installed_versions)
        exit(0, "The Java "+installed_versions+" installs on the remote host are not affected.");
      else
        audit(AUDIT_INST_VER_NOT_VULN, "Java", installed_versions);
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_JAVA-1_6_0-IBM-141119.NASL
    descriptionjava-1_6_0-ibm has been updated to version 1.6.0_sr16.2 to fix 18 security issues. These security issues has been fixed : - Unspecified vulnerability in Oracle Java SE 6u81. (CVE-2014-3065) - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the
    last seen2020-06-05
    modified2014-12-01
    plugin id79634
    published2014-12-01
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79634
    titleSuSE 11.3 Security Update : IBM Java (SAT Patch Number 9992)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from SuSE 11 update information. The text itself is
    # copyright (C) Novell, Inc.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79634);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2014-3065", "CVE-2014-3566", "CVE-2014-4288", "CVE-2014-6456", "CVE-2014-6457", "CVE-2014-6458", "CVE-2014-6466", "CVE-2014-6476", "CVE-2014-6492", "CVE-2014-6493", "CVE-2014-6502", "CVE-2014-6503", "CVE-2014-6506", "CVE-2014-6511", "CVE-2014-6512", "CVE-2014-6513", "CVE-2014-6515", "CVE-2014-6527", "CVE-2014-6531", "CVE-2014-6532", "CVE-2014-6558");
    
      script_name(english:"SuSE 11.3 Security Update : IBM Java (SAT Patch Number 9992)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 11 host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "java-1_6_0-ibm has been updated to version 1.6.0_sr16.2 to fix 18
    security issues.
    
    These security issues has been fixed :
    
      - Unspecified vulnerability in Oracle Java SE 6u81.
        (CVE-2014-3065)
    
      - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i
        and other products, uses nondeterministic CBC padding,
        which makes it easier for man-in-the-middle attackers to
        obtain cleartext data via a padding-oracle attack, aka
        the 'POODLE' issue. (CVE-2014-3566)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20, and Java SE Embedded 7u60, allows remote
        attackers to affect confidentiality, integrity, and
        availability via vectors related to AWT. (CVE-2014-6513)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-4288 / CVE-2014-6493 / CVE-2014-6532.
        (CVE-2014-6503)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-4288 / CVE-2014-6493 / CVE-2014-6503.
        (CVE-2014-6532)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-6493 / CVE-2014-6503 / CVE-2014-6532.
        (CVE-2014-4288)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-4288 / CVE-2014-6503 / CVE-2014-6532.
        (CVE-2014-6493)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20, when running on Firefox, allows remote
        attackers to affect confidentiality, integrity, and
        availability via unknown vectors related to Deployment.
        (CVE-2014-6492)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows local users to affect confidentiality,
        integrity, and availability via unknown vectors related
        to Deployment. (CVE-2014-6458)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20, when running on Internet Explorer, allows
        local users to affect confidentiality, integrity, and
        availability via unknown vectors related to Deployment.
        (CVE-2014-6466)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows
        remote attackers to affect confidentiality, integrity,
        and availability via unknown vectors related to
        Libraries. (CVE-2014-6506)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect integrity via
        unknown vectors related to Deployment. (CVE-2014-6515)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20 allows remote attackers to affect
        confidentiality via unknown vectors related to 2D.
        (CVE-2014-6511)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows
        remote attackers to affect confidentiality via unknown
        vectors related to Libraries. (CVE-2014-6531)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit
        R27.8.3 and R28.3.3 allows remote attackers to affect
        integrity via unknown vectors related to Libraries.
        (CVE-2014-6512)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit
        R27.8.3, and R28.3.3 allows remote attackers to affect
        confidentiality and integrity via vectors related to
        JSSE. (CVE-2014-6457)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows
        remote attackers to affect integrity via unknown vectors
        related to Libraries. (CVE-2014-6502)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit
        R27.8.3 and JRockit R28.3.3 allows remote attackers to
        affect integrity via unknown vectors related to
        Security. (CVE-2014-6558)
    
    More information can be found at
    http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update
    _November_2014"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=904889"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-3065.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-3566.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-4288.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6456.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6457.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6458.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6466.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6476.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6492.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6493.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6502.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6503.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6506.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6511.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6512.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6513.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6515.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6527.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6531.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6532.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6558.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply SAT patch number 9992.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_6_0-ibm");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_6_0-ibm-alsa");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_6_0-ibm-fonts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_6_0-ibm-jdbc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_6_0-ibm-plugin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/11/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
    
    pl = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(pl) || int(pl) != 3) audit(AUDIT_OS_NOT, "SuSE 11.3");
    
    
    flag = 0;
    if (rpm_check(release:"SLES11", sp:3, reference:"java-1_6_0-ibm-1.6.0_sr16.2-0.3.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, reference:"java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, reference:"java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, cpu:"i586", reference:"java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, cpu:"i586", reference:"java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, cpu:"x86_64", reference:"java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_JAVA-1_7_0-IBM-141121.NASL
    descriptionjava-1_7_0-ibm has been updated to version 1.7.0_sr7.2 to fix 21 security issues. These security issues have been fixed : - Unspecified vulnerability. (CVE-2014-3065) - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the
    last seen2020-06-05
    modified2014-12-01
    plugin id79635
    published2014-12-01
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79635
    titleSuSE 11.3 Security Update : IBM Java (SAT Patch Number 9999)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from SuSE 11 update information. The text itself is
    # copyright (C) Novell, Inc.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79635);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2014-3065", "CVE-2014-3566", "CVE-2014-4288", "CVE-2014-6456", "CVE-2014-6457", "CVE-2014-6458", "CVE-2014-6466", "CVE-2014-6476", "CVE-2014-6492", "CVE-2014-6493", "CVE-2014-6502", "CVE-2014-6503", "CVE-2014-6506", "CVE-2014-6511", "CVE-2014-6512", "CVE-2014-6513", "CVE-2014-6515", "CVE-2014-6527", "CVE-2014-6531", "CVE-2014-6532", "CVE-2014-6558");
    
      script_name(english:"SuSE 11.3 Security Update : IBM Java (SAT Patch Number 9999)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 11 host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "java-1_7_0-ibm has been updated to version 1.7.0_sr7.2 to fix 21
    security issues.
    
    These security issues have been fixed :
    
      - Unspecified vulnerability. (CVE-2014-3065)
    
      - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i
        and other products, uses nondeterministic CBC padding,
        which makes it easier for man-in-the-middle attackers to
        obtain cleartext data via a padding-oracle attack, aka
        the 'POODLE' issue. (CVE-2014-3566)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20, and Java SE Embedded 7u60, allows remote
        attackers to affect confidentiality, integrity, and
        availability via vectors related to AWT. (CVE-2014-6513)
    
      - Unspecified vulnerability in Oracle Java SE 7u67 and
        8u20 allows remote attackers to affect confidentiality,
        integrity, and availability via unknown vectors.
        (CVE-2014-6456)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-4288 / CVE-2014-6493 / CVE-2014-6532.
        (CVE-2014-6503)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-4288 / CVE-2014-6493 / CVE-2014-6503.
        (CVE-2014-6532)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-6493 / CVE-2014-6503 / CVE-2014-6532.
        (CVE-2014-4288)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-4288 / CVE-2014-6503 / CVE-2014-6532.
        (CVE-2014-6493)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20, when running on Firefox, allows remote
        attackers to affect confidentiality, integrity, and
        availability via unknown vectors related to Deployment.
        (CVE-2014-6492)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows local users to affect confidentiality,
        integrity, and availability via unknown vectors related
        to Deployment. (CVE-2014-6458)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20, when running on Internet Explorer, allows
        local users to affect confidentiality, integrity, and
        availability via unknown vectors related to Deployment.
        (CVE-2014-6466)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows
        remote attackers to affect confidentiality, integrity,
        and availability via unknown vectors related to
        Libraries. (CVE-2014-6506)
    
      - Unspecified vulnerability in Oracle Java SE 7u67 and
        8u20 allows remote attackers to affect integrity via
        unknown vectors related to Deployment, a different
        vulnerability than CVE-2014-6527. (CVE-2014-6476)
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect integrity via
        unknown vectors related to Deployment. (CVE-2014-6515)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20 allows remote attackers to affect
        confidentiality via unknown vectors related to 2D.
        (CVE-2014-6511)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows
        remote attackers to affect confidentiality via unknown
        vectors related to Libraries. (CVE-2014-6531)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit
        R27.8.3 and R28.3.3 allows remote attackers to affect
        integrity via unknown vectors related to Libraries.
        (CVE-2014-6512)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit
        R27.8.3, and R28.3.3 allows remote attackers to affect
        confidentiality and integrity via vectors related to
        JSSE. (CVE-2014-6457)
    
      - Unspecified vulnerability in Oracle Java SE 7u67 and
        8u20 allows remote attackers to affect integrity via
        unknown vectors related to Deployment, a different
        vulnerability than CVE-2014-6476. (CVE-2014-6527)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows
        remote attackers to affect integrity via unknown vectors
        related to Libraries. (CVE-2014-6502)
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit
        R27.8.3 and JRockit R28.3.3 allows remote attackers to
        affect integrity via unknown vectors related to
        Security. (CVE-2014-6558)
    
    More information can be found at
    http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update
    _November_2014"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=904889"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-3065.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-3566.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-4288.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6456.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6457.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6458.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6466.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6476.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6492.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6493.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6502.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6503.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6506.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6511.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6512.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6513.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6515.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6527.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6531.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6532.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6558.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply SAT patch number 9999.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_7_0-ibm");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_7_0-ibm-alsa");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_7_0-ibm-jdbc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_7_0-ibm-plugin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/11/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
    
    pl = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(pl) || int(pl) != 3) audit(AUDIT_OS_NOT, "SuSE 11.3");
    
    
    flag = 0;
    if (rpm_check(release:"SLES11", sp:3, reference:"java-1_7_0-ibm-1.7.0_sr8.0-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, reference:"java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, cpu:"i586", reference:"java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, cpu:"i586", reference:"java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, cpu:"x86_64", reference:"java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, cpu:"x86_64", reference:"java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2014-1541-1.NASL
    descriptionjava-1_6_0-ibm was updated to version 1.6.0_sr16.2 to fix 18 security issues. These security issues were fixed : - Unspecified vulnerability in Oracle Java SE 6u81 (CVE-2014-3065). - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the
    last seen2020-06-05
    modified2019-01-02
    plugin id119959
    published2019-01-02
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/119959
    titleSUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2014:1541-1) (POODLE)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2014:1541-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(119959);
      script_version("1.5");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2014-3065", "CVE-2014-3566", "CVE-2014-4288", "CVE-2014-6457", "CVE-2014-6458", "CVE-2014-6466", "CVE-2014-6492", "CVE-2014-6493", "CVE-2014-6502", "CVE-2014-6503", "CVE-2014-6506", "CVE-2014-6511", "CVE-2014-6512", "CVE-2014-6513", "CVE-2014-6515", "CVE-2014-6531", "CVE-2014-6532", "CVE-2014-6558");
      script_bugtraq_id(70456, 70460, 70468, 70470, 70484, 70507, 70518, 70533, 70538, 70544, 70548, 70556, 70565, 70567, 70569, 70572, 70574, 71147);
    
      script_name(english:"SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2014:1541-1) (POODLE)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "java-1_6_0-ibm was updated to version 1.6.0_sr16.2 to fix 18 security
    issues.
    
    These security issues were fixed :
    
      - Unspecified vulnerability in Oracle Java SE 6u81
        (CVE-2014-3065).
    
      - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i
        and other products, uses nondeterministic CBC padding,
        which makes it easier for man-in-the-middle attackers to
        obtain cleartext data via a padding-oracle attack, aka
        the 'POODLE' issue (CVE-2014-3566).
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20, and Java SE Embedded 7u60, allows remote
        attackers to affect confidentiality, integrity, and
        availability via vectors related to AWT (CVE-2014-6513).
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532
        (CVE-2014-6503).
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503
        (CVE-2014-6532).
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532
        (CVE-2014-4288).
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect
        confidentiality, integrity, and availability via unknown
        vectors related to Deployment, a different vulnerability
        than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532
        (CVE-2014-6493).
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20, when running on Firefox, allows remote
        attackers to affect confidentiality, integrity, and
        availability via unknown vectors related to Deployment
        (CVE-2014-6492).
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows local users to affect confidentiality,
        integrity, and availability via unknown vectors related
        to Deployment (CVE-2014-6458).
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20, when running on Internet Explorer, allows
        local users to affect confidentiality, integrity, and
        availability via unknown vectors related to Deployment
        (CVE-2014-6466).
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows
        remote attackers to affect confidentiality, integrity,
        and availability via unknown vectors related to
        Libraries (CVE-2014-6506).
    
      - Unspecified vulnerability in Oracle Java SE 6u81, 7u67,
        and 8u20 allows remote attackers to affect integrity via
        unknown vectors related to Deployment (CVE-2014-6515).
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20 allows remote attackers to affect
        confidentiality via unknown vectors related to 2D
        (CVE-2014-6511).
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows
        remote attackers to affect confidentiality via unknown
        vectors related to Libraries (CVE-2014-6531).
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit
        R27.8.3 and R28.3.3 allows remote attackers to affect
        integrity via unknown vectors related to Libraries
        (CVE-2014-6512).
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit
        R27.8.3, and R28.3.3 allows remote attackers to affect
        confidentiality and integrity via vectors related to
        JSSE (CVE-2014-6457).
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows
        remote attackers to affect integrity via unknown vectors
        related to Libraries (CVE-2014-6502).
    
      - Unspecified vulnerability in Oracle Java SE 5.0u71,
        6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit
        R27.8.3 and JRockit R28.3.3 allows remote attackers to
        affect integrity via unknown vectors related to Security
        (CVE-2014-6558).
    
    Further information can be found at
    http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update
    _Nove mber_2014
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_Nove
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?ecb047de"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=901223"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=901239"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=904889"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-3065/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-3566/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-4288/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6457/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6458/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6466/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6492/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6493/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6502/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6503/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6506/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6511/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6512/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6513/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6515/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6531/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6532/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2014-6558/"
      );
      # https://www.suse.com/support/update/announcement/2014/suse-su-20141541-1.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?3798b6d5"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Module for Legacy Software 12 :
    
    zypper in -t patch SUSE-SLE-Module-Legacy-12-2014-93
    
    To bring your system up-to-date, use 'zypper patch'."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-fonts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-jdbc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-plugin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/10/15");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/02");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/01/02");
      script_set_attribute(attribute:"in_the_news", value:"true");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES12", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES12" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP0", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES12", sp:"0", cpu:"x86_64", reference:"java-1_6_0-ibm-plugin-1.6.0_sr16.2-8.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"0", reference:"java-1_6_0-ibm-1.6.0_sr16.2-8.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"0", reference:"java-1_6_0-ibm-fonts-1.6.0_sr16.2-8.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"0", reference:"java-1_6_0-ibm-jdbc-1.6.0_sr16.2-8.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "java-1_6_0-ibm");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_JAVA-1_7_0-OPENJDK-141024.NASL
    descriptionOracle Critical Patch Update Advisory - October 2014 Description : A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities. Find more information here: http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.h tml
    last seen2020-06-05
    modified2014-11-12
    plugin id79208
    published2014-11-12
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79208
    titleSuSE 11.3 Security Update : Java OpenJDK (SAT Patch Number 9906)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from SuSE 11 update information. The text itself is
    # copyright (C) Novell, Inc.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79208);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2014-4288", "CVE-2014-6456", "CVE-2014-6457", "CVE-2014-6458", "CVE-2014-6466", "CVE-2014-6468", "CVE-2014-6476", "CVE-2014-6485", "CVE-2014-6492", "CVE-2014-6493", "CVE-2014-6502", "CVE-2014-6503", "CVE-2014-6504", "CVE-2014-6506", "CVE-2014-6511", "CVE-2014-6512", "CVE-2014-6513", "CVE-2014-6515", "CVE-2014-6517", "CVE-2014-6519", "CVE-2014-6527", "CVE-2014-6531", "CVE-2014-6532", "CVE-2014-6558", "CVE-2014-6562");
    
      script_name(english:"SuSE 11.3 Security Update : Java OpenJDK (SAT Patch Number 9906)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 11 host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Oracle Critical Patch Update Advisory - October 2014
    
    Description :
    
    A Critical Patch Update (CPU) is a collection of patches for multiple
    security vulnerabilities.
    
    Find more information here:
    http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.h
    tml"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=901242"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-4288.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6456.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6457.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6458.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6466.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6468.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6476.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6485.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6492.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6493.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6502.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6503.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6504.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6506.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6511.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6512.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6513.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6515.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6517.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6519.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6527.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6531.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6532.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6558.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-6562.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply SAT patch number 9906.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_7_0-openjdk");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_7_0-openjdk-demo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:java-1_7_0-openjdk-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/10/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/11/12");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
    
    pl = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(pl) || int(pl) != 3) audit(AUDIT_OS_NOT, "SuSE 11.3");
    
    
    flag = 0;
    if (rpm_check(release:"SLED11", sp:3, cpu:"i586", reference:"java-1_7_0-openjdk-1.7.0.71-0.7.1")) flag++;
    if (rpm_check(release:"SLED11", sp:3, cpu:"i586", reference:"java-1_7_0-openjdk-demo-1.7.0.71-0.7.1")) flag++;
    if (rpm_check(release:"SLED11", sp:3, cpu:"i586", reference:"java-1_7_0-openjdk-devel-1.7.0.71-0.7.1")) flag++;
    if (rpm_check(release:"SLED11", sp:3, cpu:"x86_64", reference:"java-1_7_0-openjdk-1.7.0.71-0.7.1")) flag++;
    if (rpm_check(release:"SLED11", sp:3, cpu:"x86_64", reference:"java-1_7_0-openjdk-demo-1.7.0.71-0.7.1")) flag++;
    if (rpm_check(release:"SLED11", sp:3, cpu:"x86_64", reference:"java-1_7_0-openjdk-devel-1.7.0.71-0.7.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyAIX Local Security Checks
    NASL idAIX_JAVA_OCT2014_ADVISORY.NASL
    descriptionThe version of Java SDK installed on the remote host is affected by the following vulnerabilities : - A privilege escalation vulnerability in the IBM Java SDK allows a local attacker to inject arbitrary code into the shared classes cache due to a flaw in the default configuration for the shared classes feature. Other users are able to execute the injected code, which can allow the attacker to gain elevated privileges. (CVE-2014-3065) - Oracle Java contains the flaw related to SSLv3 CBC-mode ciphers known as POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. A man-in-the-middle attacker can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. (CVE-2014-3566) - Vulnerabilities in Oracle Java allow remote code execution via flaws in the Deployment subcomponent. (CVE-2014-4288, CVE-2014-6492, CVE-2014-6493, CVE-2014-6503, CVE-2014-6532) - A session hijacking vulnerability exists in Oracle Java due to a flaw related to handling of server certificate changes during SSL/TLS renegotiation. This allows an attacker to intercept communication between a client and server to hijack a mutually authenticated session. (CVE-2014-6457) - Privilege escalation vulnerabilities exist in Oracle Java within the the Deployment subcomponent. (CVE-2014-6458, CVE-2014-6466) - Data integrity vulnerabilities exist in Oracle Java within the the Deployment subcomponent. (CVE-2014-6476, CVE-2014-6515, CVE-2014-6527) - A privilege escalation vulnerability exists in Oracle Java in the resource bundle handling code of the
    last seen2020-06-01
    modified2020-06-02
    plugin id79626
    published2014-11-28
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79626
    titleAIX Java Advisory : java_oct2014_advisory.asc (POODLE)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The text in the description was extracted from AIX Security
    # Advisory java_oct2014_advisory.asc
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79626);
      script_version("1.10");
      script_cvs_date("Date: 2018/07/17 12:00:06");
    
      script_cve_id(
        "CVE-2014-3065",
        "CVE-2014-3566",
        "CVE-2014-4288",
        "CVE-2014-6457",
        "CVE-2014-6458",
        "CVE-2014-6466",
        "CVE-2014-6476",
        "CVE-2014-6492",
        "CVE-2014-6493",
        "CVE-2014-6502",
        "CVE-2014-6503",
        "CVE-2014-6506",
        "CVE-2014-6511",
        "CVE-2014-6512",
        "CVE-2014-6513",
        "CVE-2014-6515",
        "CVE-2014-6527",
        "CVE-2014-6531",
        "CVE-2014-6532",
        "CVE-2014-6558"
      );
      script_bugtraq_id(
        70456,
        70460,
        70468,
        70470,
        70484,
        70507,
        70518,
        70531,
        70533,
        70538,
        70544,
        70548,
        70556,
        70560,
        70565,
        70567,
        70569,
        70572,
        70574,
        71147
      );
      script_xref(name:"CERT", value:"577193");
    
      script_name(english:"AIX Java Advisory : java_oct2014_advisory.asc (POODLE)");
      script_summary(english:"Checks the version of the Java package.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote AIX host has a version of Java SDK installed that is
    affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Java SDK installed on the remote host is affected by
    the following vulnerabilities :
    
      - A privilege escalation vulnerability in the IBM Java SDK
        allows a local attacker to inject arbitrary code into
        the shared classes cache due to a flaw in the default
        configuration for the shared classes feature. Other
        users are able to execute the injected code, which can
        allow the attacker to gain elevated privileges.
        (CVE-2014-3065)
    
      - Oracle Java contains the flaw related to SSLv3 CBC-mode
        ciphers known as POODLE. The vulnerability is due to the
        way SSL 3.0 handles padding bytes when decrypting
        messages encrypted using block ciphers in cipher block
        chaining (CBC) mode. A man-in-the-middle attacker can
        decrypt a selected byte of a cipher text in as few as
        256 tries if they are able to force a victim application
        to repeatedly send the same data over newly created SSL
        3.0 connections. (CVE-2014-3566)
    
      - Vulnerabilities in Oracle Java allow remote code
        execution via flaws in the Deployment subcomponent.
        (CVE-2014-4288, CVE-2014-6492, CVE-2014-6493,
        CVE-2014-6503, CVE-2014-6532)
    
      - A session hijacking vulnerability exists in Oracle Java
        due to a flaw related to handling of server certificate
        changes during SSL/TLS renegotiation. This allows an
        attacker to intercept communication between a client and
        server to hijack a mutually authenticated session.
        (CVE-2014-6457)
    
      - Privilege escalation vulnerabilities exist in Oracle
        Java within the the Deployment subcomponent.
        (CVE-2014-6458, CVE-2014-6466)
    
      - Data integrity vulnerabilities exist in Oracle Java
        within the the Deployment subcomponent. (CVE-2014-6476,
        CVE-2014-6515, CVE-2014-6527)
    
      - A privilege escalation vulnerability exists in Oracle
        Java in the resource bundle handling code of the
        'LogRecord::readObject' function within the file
        'share/classes/java/util/logging/LogRecord.java',
        which allows an attacker to bypass certain sandbox
        restrictions. (CVE-2014-6502)
    
      - A privilege escalation vulnerability exists in Oracle
        Java within the property processing and name handling
        code of 'share/classes/java/util/ResourceBundle.java',
        which allows an attacker to bypass certain sandbox
        restrictions. (CVE-2014-6506)
    
      - Oracle Java contains an unspecified vulnerability in the
        2D subcomponent. (CVE-2014-6511)
    
      - An information disclosure vulnerability exists in Oracle
        Java due to a flaw related to the wrapping of datagram
        sockets in the DatagramSocket implementation. This issue
        may cause packets to be read that originate from other
        sources than the connected, thus allowing a remote
        attacker to carry out IP spoofing. (CVE-2014-6512)
    
      - A flaw exists in the way splash images are handled by
        'windows/native/sun/awt/splashscreen/splashscreen_sys.c'
        which allows remote code execution. (CVE-2014-6513)
    
      - A privilege escalation vulnerability exists in Oracle
        Java in 'share/classes/java/util/logging/Logger.java'
        because it fails to check permissions in certain cases,
        allowing an attacker to bypass sandbox restrictions and
        view or edit logs. (CVE-2014-6531)
    
      - A flaw related to input cipher streams within the file
        'share/classes/javax/crypto/CipherInputStream.java' can
        allow a remote attacker to affect the data integrity.
        (CVE-2014-6558)");
      # http://aix.software.ibm.com/aix/efixes/security/java_oct2014_advisory.asc
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?82bbaf9e");
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?aacaab25");
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?70623e16");
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1d08dc51");
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4ca2561a");
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a624fae8");
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?aa3fc787");
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e42e2673");
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ae6bb0ba");
      script_set_attribute(attribute:"see_also", value:"http://www.ibm.com/developerworks/java/jdk/aix/service.html#levels");
      script_set_attribute(attribute:"solution", value:
    "Fixes are available by version and can be downloaded from the IBM AIX
    website.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:jre");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:jdk");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/11/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/11/28");
    
      script_set_attribute(attribute:"in_the_news", value:"true");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
      script_family(english:"AIX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/AIX/lslpp", "Host/local_checks_enabled", "Host/AIX/version");
    
      exit(0);
    }
    
    include("aix.inc");
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    oslevel = get_kb_item_or_exit("Host/AIX/version");
    if ( oslevel != "AIX-5.3" && oslevel != "AIX-6.1" && oslevel != "AIX-7.1" )
    {
      oslevel = ereg_replace(string:oslevel, pattern:"-", replace:" ");
      audit(AUDIT_OS_NOT, "AIX 5.3 / 6.1 / 7.1", oslevel);
    }
    if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    flag = 0;
    
    #Java5 5.0.0.580
    if (aix_check_package(release:"5.3", package:"Java5.sdk", minpackagever:"5.0.0.0", maxpackagever:"5.0.0.579", fixpackagever:"5.0.0.580") > 0) flag++;
    if (aix_check_package(release:"6.1", package:"Java5.sdk", minpackagever:"5.0.0.0", maxpackagever:"5.0.0.579", fixpackagever:"5.0.0.580") > 0) flag++;
    if (aix_check_package(release:"7.1", package:"Java5.sdk", minpackagever:"5.0.0.0", maxpackagever:"5.0.0.579", fixpackagever:"5.0.0.580") > 0) flag++;
    if (aix_check_package(release:"5.3", package:"Java5_64.sdk", minpackagever:"5.0.0.0", maxpackagever:"5.0.0.579", fixpackagever:"5.0.0.580") > 0) flag++;
    if (aix_check_package(release:"6.1", package:"Java5_64.sdk", minpackagever:"5.0.0.0", maxpackagever:"5.0.0.579", fixpackagever:"5.0.0.580") > 0) flag++;
    if (aix_check_package(release:"7.1", package:"Java5_64.sdk", minpackagever:"5.0.0.0", maxpackagever:"5.0.0.579", fixpackagever:"5.0.0.580") > 0) flag++;
    
    #Java6 6.0.0.460
    if (aix_check_package(release:"5.3", package:"Java6.sdk", minpackagever:"6.0.0.0", maxpackagever:"6.0.0.459", fixpackagever:"6.0.0.460") > 0) flag++;
    if (aix_check_package(release:"6.1", package:"Java6.sdk", minpackagever:"6.0.0.0", maxpackagever:"6.0.0.459", fixpackagever:"6.0.0.460") > 0) flag++;
    if (aix_check_package(release:"7.1", package:"Java6.sdk", minpackagever:"6.0.0.0", maxpackagever:"6.0.0.459", fixpackagever:"6.0.0.460") > 0) flag++;
    if (aix_check_package(release:"5.3", package:"Java6_64.sdk", minpackagever:"6.0.0.0", maxpackagever:"6.0.0.459", fixpackagever:"6.0.0.460") > 0) flag++;
    if (aix_check_package(release:"6.1", package:"Java6_64.sdk", minpackagever:"6.0.0.0", maxpackagever:"6.0.0.459", fixpackagever:"6.0.0.460") > 0) flag++;
    if (aix_check_package(release:"7.1", package:"Java6_64.sdk", minpackagever:"6.0.0.0", maxpackagever:"6.0.0.459", fixpackagever:"6.0.0.460") > 0) flag++;
    
    #Java7 7.0.0.135
    if (aix_check_package(release:"6.1", package:"Java7.sdk", minpackagever:"7.0.0.0", maxpackagever:"7.0.0.134", fixpackagever:"7.0.0.135") > 0) flag++;
    if (aix_check_package(release:"7.1", package:"Java7.sdk", minpackagever:"7.0.0.0", maxpackagever:"7.0.0.134", fixpackagever:"7.0.0.135") > 0) flag++;
    if (aix_check_package(release:"6.1", package:"Java7_64.sdk", minpackagever:"7.0.0.0", maxpackagever:"7.0.0.134", fixpackagever:"7.0.0.135") > 0) flag++;
    if (aix_check_package(release:"7.1", package:"Java7_64.sdk", minpackagever:"7.0.0.0", maxpackagever:"7.0.0.134", fixpackagever:"7.0.0.135") > 0) flag++;
    
    #Java7.1 7.1.0.15
    if (aix_check_package(release:"6.1", package:"Java7.sdk", minpackagever:"7.1.0.0", maxpackagever:"7.1.0.14", fixpackagever:"7.1.0.15") > 0) flag++;
    if (aix_check_package(release:"7.1", package:"Java7.sdk", minpackagever:"7.1.0.0", maxpackagever:"7.1.0.14", fixpackagever:"7.1.0.15") > 0) flag++;
    if (aix_check_package(release:"6.1", package:"Java7_64.sdk", minpackagever:"7.1.0.0", maxpackagever:"7.1.0.14", fixpackagever:"7.1.0.15") > 0) flag++;
    if (aix_check_package(release:"7.1", package:"Java7_64.sdk", minpackagever:"7.1.0.0", maxpackagever:"7.1.0.14", fixpackagever:"7.1.0.15") > 0) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : aix_report_get()
      );
    }
    else
    {
      tested = aix_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Java5 / Java6 / Java7");
    }
    
  • NASL familyMisc.
    NASL idORACLE_JAVA_CPU_OCT_2014_UNIX.NASL
    descriptionThe version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8 Update 25, 7 Update 71, 6 Update 85, or 5 Update 75. It is, therefore, affected by security issues in the following components : - 2D - AWT - Deployment - Hotspot - JAXP - JSSE - JavaFX - Libraries - Security
    last seen2020-06-01
    modified2020-06-02
    plugin id78482
    published2014-10-15
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/78482
    titleOracle Java SE Multiple Vulnerabilities (October 2014 CPU) (Unix)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(78482);
      script_version("1.9");
      script_cvs_date("Date: 2018/11/15 20:50:23");
    
      script_cve_id(
        "CVE-2014-4288",
        "CVE-2014-6456",
        "CVE-2014-6457",
        "CVE-2014-6458",
        "CVE-2014-6466",
        "CVE-2014-6468",
        "CVE-2014-6476",
        "CVE-2014-6485",
        "CVE-2014-6492",
        "CVE-2014-6493",
        "CVE-2014-6502",
        "CVE-2014-6503",
        "CVE-2014-6504",
        "CVE-2014-6506",
        "CVE-2014-6511",
        "CVE-2014-6512",
        "CVE-2014-6513",
        "CVE-2014-6515",
        "CVE-2014-6517",
        "CVE-2014-6519",
        "CVE-2014-6527",
        "CVE-2014-6531",
        "CVE-2014-6532",
        "CVE-2014-6558",
        "CVE-2014-6562"
      );
      script_bugtraq_id(
        70456,
        70460,
        70468,
        70470,
        70484,
        70488,
        70507,
        70518,
        70519,
        70522,
        70523,
        70531,
        70533,
        70538,
        70544,
        70548,
        70552,
        70556,
        70560,
        70564,
        70565,
        70567,
        70569,
        70570,
        70572
      );
    
      script_name(english:"Oracle Java SE Multiple Vulnerabilities (October 2014 CPU) (Unix)");
      script_summary(english:"Checks the version of the JRE.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Unix host contains a programming platform that is affected
    by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Oracle (formerly Sun) Java SE or Java for Business
    installed on the remote host is prior to 8 Update 25, 7 Update 71, 6
    Update 85, or 5 Update 75. It is, therefore, affected by security
    issues in the following components :
    
      - 2D
      - AWT
      - Deployment
      - Hotspot
      - JAXP
      - JSSE
      - JavaFX
      - Libraries
      - Security");
      # https://www.oracle.com/technetwork/topics/security/alerts-086861.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2b7fdf57");
      # Java SE JDK and JRE 8 Update 25
      # https://www.oracle.com/technetwork/java/javase/8u25-relnotes-2296185.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?631ebd82");
      # Java SE JDK and JRE 7 Update 71
      # https://www.oracle.com/technetwork/java/javase/7u71-relnotes-2296187.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?cd6e3a16");
      # Java SE JDK and JRE 6 Update 85
      # http://www.oracle.com/technetwork/java/javase/documentation/overview-156328.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?726f7054");
      # Java SE JDK and JRE 5.0 Update 75
      # https://www.oracle.com/technetwork/java/javase/documentation/overview-137139.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?84f3023c");
      script_set_attribute(attribute:"solution", value:
    "Update to JDK / JRE 8 Update 25, 7 Update 71, 6 Update 85, or 5 Update
    75 or later and, if necessary, remove any affected versions.
    
    Note that an Extended Support contract with Oracle is needed to obtain
    JDK / JRE 5 Update 75 or later or 6 Update 85 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/10/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/10/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/15");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:jre");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:jdk");
      script_set_attribute(attribute:"agent", value:"unix");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("sun_java_jre_installed_unix.nasl");
      script_require_keys("Host/Java/JRE/Installed");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    # Check each installed JRE.
    installs = get_kb_list_or_exit("Host/Java/JRE/Unmanaged/*");
    
    info = "";
    vuln = 0;
    vuln2 = 0;
    installed_versions = "";
    granular = "";
    
    foreach install (list_uniq(keys(installs)))
    {
      ver = install - "Host/Java/JRE/Unmanaged/";
      if (ver !~ "^[0-9.]+") continue;
    
      installed_versions = installed_versions + " & " + ver;
    
      if (
        ver =~ '^1\\.5\\.0_(0?[0-9]|[0-6][0-9]|7[0-4])([^0-9]|$)' ||
        ver =~ '^1\\.6\\.0_(0?[0-9]|[0-7][0-9]|8[0-4])([^0-9]|$)' ||
        ver =~ '^1\\.7\\.0_(0?[0-9]|[0-6][0-9]|70)([^0-9]|$)'     ||
        ver =~ '^1\\.8\\.0_(0?[0-9]|1[0-9]|2[0-4])([^0-9]|$)'
      )
      {
        dirs = make_list(get_kb_list(install));
        vuln += max_index(dirs);
    
        foreach dir (dirs)
          info += '\n  Path              : ' + dir;
    
        info += '\n  Installed version : ' + ver;
        info += '\n  Fixed versions    : 1.5.0_75 / 1.6.0_85 / 1.7.0_71 / 1.8.0_25\n';
      }
      else if (ver =~ "^[\d\.]+$")
      {
        dirs = make_list(get_kb_list(install));
        foreach dir (dirs)
          granular += "The Oracle Java version "+ver+" at "+dir+" is not granular enough to make a determination."+'\n';
      }
      else
      {
        dirs = make_list(get_kb_list(install));
        vuln2 += max_index(dirs);
      }
    
    }
    
    # Report if any were found to be vulnerable.
    if (info)
    {
      if (report_verbosity > 0)
      {
        if (vuln > 1) s = "s of Java are";
        else s = " of Java is";
    
        report =
          '\n' +
          'The following vulnerable instance'+s+' installed on the\n' +
          'remote host :\n' +
          info;
        security_hole(port:0, extra:report);
      }
      else security_hole(0);
      if (granular) exit(0, granular);
    }
    else
    {
      if (granular) exit(0, granular);
    
      installed_versions = substr(installed_versions, 3);
      if (vuln2 > 1)
        exit(0, "The Java "+installed_versions+" installs on the remote host are not affected.");
      else
        exit(0, "The Java "+installed_versions+" install on the remote host is not affected.");
    }