Lucene search

K
nessusThis script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.FEDORA_2010-16312.NASL
HistoryOct 18, 2010 - 12:00 a.m.

Fedora 14 : java-1.6.0-openjdk-1.6.0.0-44.1.9.1.fc14 (2010-16312)

2010-10-1800:00:00
This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
16
  • Bug #533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation

    • Bug #642202 - CVE-2010-3541 CVE-2010-3573 OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)

    • Bug #639909 - CVE-2010-3548 OpenJDK DNS server IP address information leak (6957564)

    • Bug #642180 - CVE-2010-3549 OpenJDK HttpURLConnection request splitting (6952017)

    • Bug #642187 - CVE-2010-3551 OpenJDK local network address disclosure (6952603)

    • Bug #642167 - CVE-2010-3553 OpenJDK Swing unsafe reflection usage (6622002)

    • Bug #639880 - CVE-2010-3554 CVE-2010-3561 OpenJDK corba reflection vulnerabilities (6891766,6925672)

    • Bug #639904 - CVE-2010-3557 OpenJDK Swing mutable static (6938813)

    • Bug #639897 - CVE-2010-3562 OpenJDK IndexColorModel double-free (6925710)

    • Bug #639914 - CVE-2010-3564 OpenJDK kerberos vulnerability (6958060)

    • Bug #639920 - CVE-2010-3565 OpenJDK JPEG writeImage remote code execution (6963023)

    • Bug #642197 - CVE-2010-3567 OpenJDK ICU Opentype layout engine crash (6963285)

    • Bug #639876 - CVE-2010-3568 OpenJDK Deserialization Race condition (6559775)

    • Bug #639925 - CVE-2010-3569 OpenJDK Serialization inconsistencies (6966692)

    • Bug #642215 - CVE-2010-3574 OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory 2010-16312.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(50007);
  script_version("1.19");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");

  script_cve_id("CVE-2009-3555", "CVE-2010-3541", "CVE-2010-3548", "CVE-2010-3549", "CVE-2010-3551", "CVE-2010-3553", "CVE-2010-3554", "CVE-2010-3557", "CVE-2010-3561", "CVE-2010-3562", "CVE-2010-3564", "CVE-2010-3565", "CVE-2010-3567", "CVE-2010-3568", "CVE-2010-3569", "CVE-2010-3573", "CVE-2010-3574");
  script_bugtraq_id(36935, 43963, 43979, 43985, 43992, 43994, 44009, 44011, 44012, 44013, 44014, 44016, 44017, 44027, 44028, 44032, 44035);
  script_xref(name:"FEDORA", value:"2010-16312");

  script_name(english:"Fedora 14 : java-1.6.0-openjdk-1.6.0.0-44.1.9.1.fc14 (2010-16312)");
  script_summary(english:"Checks rpm output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"  - Bug #533125 - CVE-2009-3555 TLS: MITM attacks via
    session renegotiation

  - Bug #642202 - CVE-2010-3541 CVE-2010-3573 OpenJDK
    HttpURLConnection allows arbitrary request headers
    (6961084,6980004)

  - Bug #639909 - CVE-2010-3548 OpenJDK DNS server IP
    address information leak (6957564)

  - Bug #642180 - CVE-2010-3549 OpenJDK HttpURLConnection
    request splitting (6952017)

  - Bug #642187 - CVE-2010-3551 OpenJDK local network
    address disclosure (6952603)

  - Bug #642167 - CVE-2010-3553 OpenJDK Swing unsafe
    reflection usage (6622002)

  - Bug #639880 - CVE-2010-3554 CVE-2010-3561 OpenJDK corba
    reflection vulnerabilities (6891766,6925672)

  - Bug #639904 - CVE-2010-3557 OpenJDK Swing mutable static
    (6938813)

  - Bug #639897 - CVE-2010-3562 OpenJDK IndexColorModel
    double-free (6925710)

  - Bug #639914 - CVE-2010-3564 OpenJDK kerberos
    vulnerability (6958060)

  - Bug #639920 - CVE-2010-3565 OpenJDK JPEG writeImage
    remote code execution (6963023)

  - Bug #642197 - CVE-2010-3567 OpenJDK ICU Opentype layout
    engine crash (6963285)

  - Bug #639876 - CVE-2010-3568 OpenJDK Deserialization Race
    condition (6559775)

  - Bug #639925 - CVE-2010-3569 OpenJDK Serialization
    inconsistencies (6966692)

  - Bug #642215 - CVE-2010-3574 OpenJDK HttpURLConnection
    incomplete TRACE permission check (6981426)

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=533125"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=639876"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=639880"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=639897"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=639904"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=639909"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=639914"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=639920"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=639925"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=642167"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=642180"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=642187"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=642197"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=642202"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=642215"
  );
  # https://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?6eb8d7c9"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected java-1.6.0-openjdk package."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");
  script_cwe_id(310);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:java-1.6.0-openjdk");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:14");

  script_set_attribute(attribute:"vuln_publication_date", value:"2009/11/09");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/10/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/10/18");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^14([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 14.x", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);

flag = 0;
if (rpm_check(release:"FC14", reference:"java-1.6.0-openjdk-1.6.0.0-44.1.9.1.fc14")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "java-1.6.0-openjdk");
}
VendorProductVersionCPE
fedoraprojectfedorajava-1.6.0-openjdkp-cpe:/a:fedoraproject:fedora:java-1.6.0-openjdk
fedoraprojectfedora14cpe:/o:fedoraproject:fedora:14

References