Bug #533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation
Bug #642202 - CVE-2010-3541 CVE-2010-3573 OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)
Bug #639909 - CVE-2010-3548 OpenJDK DNS server IP address information leak (6957564)
Bug #642180 - CVE-2010-3549 OpenJDK HttpURLConnection request splitting (6952017)
Bug #642187 - CVE-2010-3551 OpenJDK local network address disclosure (6952603)
Bug #642167 - CVE-2010-3553 OpenJDK Swing unsafe reflection usage (6622002)
Bug #639880 - CVE-2010-3554 CVE-2010-3561 OpenJDK corba reflection vulnerabilities (6891766,6925672)
Bug #639904 - CVE-2010-3557 OpenJDK Swing mutable static (6938813)
Bug #639897 - CVE-2010-3562 OpenJDK IndexColorModel double-free (6925710)
Bug #639914 - CVE-2010-3564 OpenJDK kerberos vulnerability (6958060)
Bug #639920 - CVE-2010-3565 OpenJDK JPEG writeImage remote code execution (6963023)
Bug #642197 - CVE-2010-3567 OpenJDK ICU Opentype layout engine crash (6963285)
Bug #639876 - CVE-2010-3568 OpenJDK Deserialization Race condition (6559775)
Bug #639925 - CVE-2010-3569 OpenJDK Serialization inconsistencies (6966692)
Bug #642215 - CVE-2010-3574 OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2010-16312.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(50007);
script_version("1.19");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2009-3555", "CVE-2010-3541", "CVE-2010-3548", "CVE-2010-3549", "CVE-2010-3551", "CVE-2010-3553", "CVE-2010-3554", "CVE-2010-3557", "CVE-2010-3561", "CVE-2010-3562", "CVE-2010-3564", "CVE-2010-3565", "CVE-2010-3567", "CVE-2010-3568", "CVE-2010-3569", "CVE-2010-3573", "CVE-2010-3574");
script_bugtraq_id(36935, 43963, 43979, 43985, 43992, 43994, 44009, 44011, 44012, 44013, 44014, 44016, 44017, 44027, 44028, 44032, 44035);
script_xref(name:"FEDORA", value:"2010-16312");
script_name(english:"Fedora 14 : java-1.6.0-openjdk-1.6.0.0-44.1.9.1.fc14 (2010-16312)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
" - Bug #533125 - CVE-2009-3555 TLS: MITM attacks via
session renegotiation
- Bug #642202 - CVE-2010-3541 CVE-2010-3573 OpenJDK
HttpURLConnection allows arbitrary request headers
(6961084,6980004)
- Bug #639909 - CVE-2010-3548 OpenJDK DNS server IP
address information leak (6957564)
- Bug #642180 - CVE-2010-3549 OpenJDK HttpURLConnection
request splitting (6952017)
- Bug #642187 - CVE-2010-3551 OpenJDK local network
address disclosure (6952603)
- Bug #642167 - CVE-2010-3553 OpenJDK Swing unsafe
reflection usage (6622002)
- Bug #639880 - CVE-2010-3554 CVE-2010-3561 OpenJDK corba
reflection vulnerabilities (6891766,6925672)
- Bug #639904 - CVE-2010-3557 OpenJDK Swing mutable static
(6938813)
- Bug #639897 - CVE-2010-3562 OpenJDK IndexColorModel
double-free (6925710)
- Bug #639914 - CVE-2010-3564 OpenJDK kerberos
vulnerability (6958060)
- Bug #639920 - CVE-2010-3565 OpenJDK JPEG writeImage
remote code execution (6963023)
- Bug #642197 - CVE-2010-3567 OpenJDK ICU Opentype layout
engine crash (6963285)
- Bug #639876 - CVE-2010-3568 OpenJDK Deserialization Race
condition (6559775)
- Bug #639925 - CVE-2010-3569 OpenJDK Serialization
inconsistencies (6966692)
- Bug #642215 - CVE-2010-3574 OpenJDK HttpURLConnection
incomplete TRACE permission check (6981426)
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=533125"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=639876"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=639880"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=639897"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=639904"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=639909"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=639914"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=639920"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=639925"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=642167"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=642180"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=642187"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=642197"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=642202"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=642215"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?6eb8d7c9"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected java-1.6.0-openjdk package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_cwe_id(310);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:java-1.6.0-openjdk");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:14");
script_set_attribute(attribute:"vuln_publication_date", value:"2009/11/09");
script_set_attribute(attribute:"patch_publication_date", value:"2010/10/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/10/18");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^14([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 14.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC14", reference:"java-1.6.0-openjdk-1.6.0.0-44.1.9.1.fc14")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "java-1.6.0-openjdk");
}
Vendor | Product | Version | CPE |
---|---|---|---|
fedoraproject | fedora | java-1.6.0-openjdk | p-cpe:/a:fedoraproject:fedora:java-1.6.0-openjdk |
fedoraproject | fedora | 14 | cpe:/o:fedoraproject:fedora:14 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3554
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3561
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3564
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3567
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574
www.nessus.org/u?6eb8d7c9
bugzilla.redhat.com/show_bug.cgi?id=533125
bugzilla.redhat.com/show_bug.cgi?id=639876
bugzilla.redhat.com/show_bug.cgi?id=639880
bugzilla.redhat.com/show_bug.cgi?id=639897
bugzilla.redhat.com/show_bug.cgi?id=639904
bugzilla.redhat.com/show_bug.cgi?id=639909
bugzilla.redhat.com/show_bug.cgi?id=639914
bugzilla.redhat.com/show_bug.cgi?id=639920
bugzilla.redhat.com/show_bug.cgi?id=639925
bugzilla.redhat.com/show_bug.cgi?id=642167
bugzilla.redhat.com/show_bug.cgi?id=642180
bugzilla.redhat.com/show_bug.cgi?id=642187
bugzilla.redhat.com/show_bug.cgi?id=642197
bugzilla.redhat.com/show_bug.cgi?id=642202
bugzilla.redhat.com/show_bug.cgi?id=642215