Lucene search

K
nessusThis script is Copyright (C) 2011-2023 Tenable Network Security, Inc.MACOSX_JAVA_10_6_UPDATE4.NASL
HistoryMar 09, 2011 - 12:00 a.m.

Mac OS X : Java for Mac OS X 10.6 Update 4

2011-03-0900:00:00
This script is Copyright (C) 2011-2023 Tenable Network Security, Inc.
www.tenable.com
38

9.7 High

AI Score

Confidence

High

The remote Mac OS X host is running a version of Java for Mac OS X 10.6 that is missing Update 4. As such, it is affected by several security vulnerabilities, the most serious of which may allow an untrusted Java applet to execute arbitrary code with the privileges of the current user outside the Java sandbox.

#TRUSTED b1fb20ed01e7baf3d03a72f489325df2742860f3cfc2f7716912a04847c9981a41c01f321f27a9c019ab381b18365051ad5c9ab4169afed9c79df229f899bb9af556a9a43dc35a4d7de3258119c9334d941e95bc17465942866b914536558580f3d236d7cff8413ccfffb746c6c1e8c03d90b3f28546bb608121eecabe5f717398fcb2c3332c01fb99f2a510da1f4f3a4f7ca56db318fafb9bc7978f46d32aabc4cbf59f4d07000cdf03151b7946b1fb46ca1ec663b41e997d3368db70ce4944abf2c1daab876438c65f55bb90654f57d44a891bf36a62eb5c40ba8ecc4a7c7116e573884b838e0f8be4af50840427732de6de9c95dcf71ffce544ac2261cc374535da2132b33086fa1dd6ab61f2afc58e05a4f43f1d491926cd132fb8c640a951104d02debfeeba29e40c8fc8fb13e6b504f196a75e5d294f768280f63efe7876607bfce2046cc7af509b10e631b184ebd3f447092de5ef23425d0c9ad061fb4f18f9447c4200c652430cec140d72111a3eade2a27065c44b06cbb3d69a62de92661863d1b8e10de1a1769df86277a8994b25203f1f098faea777113885a612b7221935848fbf96560fcec28739e23ed2d42c07b537474610d111fc05de0d687c6b34af62fabb3a61544b567fe7fcc6e7ef522a2d9b618707b0f986ef32971aabac699c446c920aaa3c781976fbcd47e28ca13439b2527a61a3bb06a1806437
#TRUST-RSA-SHA256 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
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(52588);
  script_version("1.17");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/27");

  script_cve_id(
    "CVE-2010-4422",
    "CVE-2010-4447",
    "CVE-2010-4448",
    "CVE-2010-4450",
    "CVE-2010-4454",
    "CVE-2010-4462",
    "CVE-2010-4463",
    "CVE-2010-4465",
    "CVE-2010-4467",
    "CVE-2010-4468",
    "CVE-2010-4469",
    "CVE-2010-4470",
    "CVE-2010-4471",
    "CVE-2010-4472",
    "CVE-2010-4473",
    "CVE-2010-4476"
  );
  script_bugtraq_id(
    46091,
    46386,
    46387,
    46391,
    46393,
    46394,
    46395,
    46397,
    46398,
    46399,
    46400,
    46402,
    46403,
    46404,
    46406,
    46409
  );

  script_name(english:"Mac OS X : Java for Mac OS X 10.6 Update 4");
  script_summary(english:"Checks version of the JavaVM framework");

  script_set_attribute(
    attribute:"synopsis",
    value:
"The remote host has a version of Java that is affected by multiple
vulnerabilities."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote Mac OS X host is running a version of Java for Mac OS X
10.6 that is missing Update 4.  As such, it is affected by several
security vulnerabilities, the most serious of which may allow an
untrusted Java applet to execute arbitrary code with the privileges of
the current user outside the Java sandbox."
  );
  script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/HT4562");
  script_set_attribute(attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2011/Mar/msg00001.html");
  script_set_attribute(attribute:"solution", value:"Upgrade to Java for Mac OS X 10.6 Update 4 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2010-4473");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2011/02/01");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/03/08");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/03/09");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"MacOS X Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2011-2023 Tenable Network Security, Inc.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/MacOSX/packages");

  exit(0);
}


include("misc_func.inc");
include("ssh_func.inc");
include("macosx_func.inc");



enable_ssh_wrappers();

function exec(cmd)
{
  local_var ret, buf;

  if (islocalhost())
    buf = pread_wrapper(cmd:"/bin/bash", argv:make_list("bash", "-c", cmd));
  else
  {
    ret = ssh_open_connection();
    if (!ret) exit(1, "ssh_open_connection() failed.");
    buf = ssh_cmd(cmd:cmd);
    ssh_close_connection();
  }
  return buf;
}


packages = get_kb_item("Host/MacOSX/packages");
if (!packages) exit(0, "The 'Host/MacOSX/packages' KB item is missing.");

uname = get_kb_item("Host/uname");
if (!uname) exit(1, "The 'Host/uname' KB item is missing.");

# Mac OS X 10.6 only.
if (!egrep(pattern:"Darwin.* 10\.", string:uname)) exit(0, "The remote Mac is not running Mac OS X 10.6 and thus is not affected.");

plist = "/System/Library/Frameworks/JavaVM.framework/Versions/A/Resources/version.plist";
cmd =
  'cat ' + plist + ' | ' +
  'grep -A 1 CFBundleVersion | ' +
  'tail -n 1 | ' +
  'sed \'s/.*string>\\(.*\\)<\\/string>.*/\\1/g\'';
version = exec(cmd:cmd);
if (!strlen(version)) exit(1, "Failed to get the version of the JavaVM Framework.");

version = chomp(version);
if (!ereg(pattern:"^[0-9]+\.", string:version)) exit(1, "The JavaVM Framework version does not appear to be numeric ("+version+").");

ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
  ver[i] = int(ver[i]);

# Fixed in version 13.4.0.
if (
  ver[0] < 13 ||
  (ver[0] == 13 && ver[1] < 4)
)
{
  gs_opt = get_kb_item("global_settings/report_verbosity");
  if (gs_opt && gs_opt != 'Quiet')
  {
    report =
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 13.4.0\n';
    security_hole(port:0, extra:report);
  }
  else security_hole(0);
}
else exit(0, "The remote host is not affected since JavaVM Framework version "+version+" is installed.");

References