Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in sandbox bypass, use of insecure cryptography, side channel attacks, information disclosure, the execution of arbitrary code, denial of service or bypassing Jar verification.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-3919. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(101984);
script_version("3.14");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2017-10053", "CVE-2017-10067", "CVE-2017-10074", "CVE-2017-10078", "CVE-2017-10081", "CVE-2017-10087", "CVE-2017-10089", "CVE-2017-10090", "CVE-2017-10096", "CVE-2017-10101", "CVE-2017-10102", "CVE-2017-10107", "CVE-2017-10108", "CVE-2017-10109", "CVE-2017-10110", "CVE-2017-10111", "CVE-2017-10115", "CVE-2017-10116", "CVE-2017-10118", "CVE-2017-10135", "CVE-2017-10176", "CVE-2017-10193", "CVE-2017-10198");
script_xref(name:"DSA", value:"3919");
script_name(english:"Debian DSA-3919-1 : openjdk-8 - security update");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in sandbox
bypass, use of insecure cryptography, side channel attacks,
information disclosure, the execution of arbitrary code, denial of
service or bypassing Jar verification."
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/stretch/openjdk-8"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.debian.org/security/2017/dsa-3919"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the openjdk-8 packages.
For the stable distribution (stretch), these problems have been fixed
in version 8u141-b15-1~deb9u1."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:openjdk-8");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/08/08");
script_set_attribute(attribute:"patch_publication_date", value:"2017/07/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/07/27");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"9.0", prefix:"openjdk-8-dbg", reference:"8u141-b15-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"openjdk-8-demo", reference:"8u141-b15-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"openjdk-8-doc", reference:"8u141-b15-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"openjdk-8-jdk", reference:"8u141-b15-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"openjdk-8-jdk-headless", reference:"8u141-b15-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"openjdk-8-jre", reference:"8u141-b15-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"openjdk-8-jre-headless", reference:"8u141-b15-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"openjdk-8-jre-zero", reference:"8u141-b15-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"openjdk-8-source", reference:"8u141-b15-1~deb9u1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | openjdk-8 | p-cpe:/a:debian:debian_linux:openjdk-8 |
debian | debian_linux | 9.0 | cpe:/o:debian:debian_linux:9.0 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
packages.debian.org/source/stretch/openjdk-8
www.debian.org/security/2017/dsa-3919