Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Network Satellite Server 5.4.
The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Network Satellite Server 5.4. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets.
Several flaws were fixed in the IBM Java 2 Runtime Environment.
(CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0865, CVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873, CVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560, CVE-2011-3561, CVE-2011-3563, CVE-2011-5035, CVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501, CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507, CVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533, CVE-2012-1541, CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1725, CVE-2012-3143, CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342, CVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068, CVE-2012-5069, CVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5079, CVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5089, CVE-2013-0169, CVE-2013-0351, CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445, CVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476, CVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487, CVE-2013-1491, CVE-2013-1493, CVE-2013-1500, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1563, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424, CVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435, CVE-2013-2437, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2459, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473, CVE-2013-3743)
Users of Red Hat Network Satellite Server 5.4 are advised to upgrade to these updated packages, which contain the IBM Java SE 6 SR14 release. For this update to take effect, Red Hat Network Satellite Server must be restarted (‘/usr/sbin/rhn-satellite restart’), as well as all running instances of IBM Java.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2013:1455. The text
# itself is copyright (C) Red Hat, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(78975);
script_version("1.22");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/12/05");
script_cve_id(
"CVE-2011-0802",
"CVE-2011-0814",
"CVE-2011-0862",
"CVE-2011-0863",
"CVE-2011-0865",
"CVE-2011-0867",
"CVE-2011-0868",
"CVE-2011-0869",
"CVE-2011-0871",
"CVE-2011-0873",
"CVE-2011-3389",
"CVE-2011-3516",
"CVE-2011-3521",
"CVE-2011-3544",
"CVE-2011-3545",
"CVE-2011-3546",
"CVE-2011-3547",
"CVE-2011-3548",
"CVE-2011-3549",
"CVE-2011-3550",
"CVE-2011-3551",
"CVE-2011-3552",
"CVE-2011-3553",
"CVE-2011-3554",
"CVE-2011-3556",
"CVE-2011-3557",
"CVE-2011-3560",
"CVE-2011-3561",
"CVE-2011-3563",
"CVE-2011-5035",
"CVE-2012-0497",
"CVE-2012-0498",
"CVE-2012-0499",
"CVE-2012-0500",
"CVE-2012-0501",
"CVE-2012-0502",
"CVE-2012-0503",
"CVE-2012-0505",
"CVE-2012-0506",
"CVE-2012-0507",
"CVE-2012-0547",
"CVE-2012-0551",
"CVE-2012-1531",
"CVE-2012-1532",
"CVE-2012-1533",
"CVE-2012-1541",
"CVE-2012-1682",
"CVE-2012-1713",
"CVE-2012-1716",
"CVE-2012-1717",
"CVE-2012-1718",
"CVE-2012-1719",
"CVE-2012-1721",
"CVE-2012-1722",
"CVE-2012-1725",
"CVE-2012-3143",
"CVE-2012-3159",
"CVE-2012-3213",
"CVE-2012-3216",
"CVE-2012-3342",
"CVE-2012-4820",
"CVE-2012-4822",
"CVE-2012-4823",
"CVE-2012-5068",
"CVE-2012-5069",
"CVE-2012-5071",
"CVE-2012-5072",
"CVE-2012-5073",
"CVE-2012-5075",
"CVE-2012-5079",
"CVE-2012-5081",
"CVE-2012-5083",
"CVE-2012-5084",
"CVE-2012-5089",
"CVE-2013-0169",
"CVE-2013-0351",
"CVE-2013-0401",
"CVE-2013-0409",
"CVE-2013-0419",
"CVE-2013-0423",
"CVE-2013-0424",
"CVE-2013-0425",
"CVE-2013-0426",
"CVE-2013-0427",
"CVE-2013-0428",
"CVE-2013-0432",
"CVE-2013-0433",
"CVE-2013-0434",
"CVE-2013-0435",
"CVE-2013-0438",
"CVE-2013-0440",
"CVE-2013-0441",
"CVE-2013-0442",
"CVE-2013-0443",
"CVE-2013-0445",
"CVE-2013-0446",
"CVE-2013-0450",
"CVE-2013-0809",
"CVE-2013-1473",
"CVE-2013-1476",
"CVE-2013-1478",
"CVE-2013-1480",
"CVE-2013-1481",
"CVE-2013-1486",
"CVE-2013-1487",
"CVE-2013-1491",
"CVE-2013-1493",
"CVE-2013-1500",
"CVE-2013-1537",
"CVE-2013-1540",
"CVE-2013-1557",
"CVE-2013-1563",
"CVE-2013-1569",
"CVE-2013-1571",
"CVE-2013-2383",
"CVE-2013-2384",
"CVE-2013-2394",
"CVE-2013-2407",
"CVE-2013-2412",
"CVE-2013-2417",
"CVE-2013-2418",
"CVE-2013-2419",
"CVE-2013-2420",
"CVE-2013-2422",
"CVE-2013-2424",
"CVE-2013-2429",
"CVE-2013-2430",
"CVE-2013-2432",
"CVE-2013-2433",
"CVE-2013-2435",
"CVE-2013-2437",
"CVE-2013-2440",
"CVE-2013-2442",
"CVE-2013-2443",
"CVE-2013-2444",
"CVE-2013-2446",
"CVE-2013-2447",
"CVE-2013-2448",
"CVE-2013-2450",
"CVE-2013-2451",
"CVE-2013-2452",
"CVE-2013-2453",
"CVE-2013-2454",
"CVE-2013-2455",
"CVE-2013-2456",
"CVE-2013-2457",
"CVE-2013-2459",
"CVE-2013-2463",
"CVE-2013-2464",
"CVE-2013-2465",
"CVE-2013-2466",
"CVE-2013-2468",
"CVE-2013-2469",
"CVE-2013-2470",
"CVE-2013-2471",
"CVE-2013-2472",
"CVE-2013-2473",
"CVE-2013-3743"
);
script_xref(name:"RHSA", value:"2013:1455");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/03/24");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/04/18");
script_xref(name:"CEA-ID", value:"CEA-2019-0547");
script_name(english:"RHEL 5 / 6 : IBM Java Runtime in Satellite Server (RHSA-2013:1455) (BEAST) (ROBOT)");
script_set_attribute(attribute:"synopsis", value:
"The remote Red Hat host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"Updated java-1.6.0-ibm packages that fix several security issues are
now available for Red Hat Network Satellite Server 5.4.
The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
This update corrects several security vulnerabilities in the IBM Java
Runtime Environment shipped as part of Red Hat Network Satellite
Server 5.4. In a typical operating environment, these are of low
security risk as the runtime is not used on untrusted applets.
Several flaws were fixed in the IBM Java 2 Runtime Environment.
(CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863,
CVE-2011-0865, CVE-2011-0867, CVE-2011-0868, CVE-2011-0869,
CVE-2011-0871, CVE-2011-0873, CVE-2011-3389, CVE-2011-3516,
CVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546,
CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550,
CVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554,
CVE-2011-3556, CVE-2011-3557, CVE-2011-3560, CVE-2011-3561,
CVE-2011-3563, CVE-2011-5035, CVE-2012-0497, CVE-2012-0498,
CVE-2012-0499, CVE-2012-0500, CVE-2012-0501, CVE-2012-0502,
CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507,
CVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532,
CVE-2012-1533, CVE-2012-1541, CVE-2012-1682, CVE-2012-1713,
CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719,
CVE-2012-1721, CVE-2012-1722, CVE-2012-1725, CVE-2012-3143,
CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342,
CVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068,
CVE-2012-5069, CVE-2012-5071, CVE-2012-5072, CVE-2012-5073,
CVE-2012-5075, CVE-2012-5079, CVE-2012-5081, CVE-2012-5083,
CVE-2012-5084, CVE-2012-5089, CVE-2013-0169, CVE-2013-0351,
CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,
CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427,
CVE-2013-0428, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434,
CVE-2013-0435, CVE-2013-0438, CVE-2013-0440, CVE-2013-0441,
CVE-2013-0442, CVE-2013-0443, CVE-2013-0445, CVE-2013-0446,
CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476,
CVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486,
CVE-2013-1487, CVE-2013-1491, CVE-2013-1493, CVE-2013-1500,
CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1563,
CVE-2013-1569, CVE-2013-1571, CVE-2013-2383, CVE-2013-2384,
CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417,
CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422,
CVE-2013-2424, CVE-2013-2429, CVE-2013-2430, CVE-2013-2432,
CVE-2013-2433, CVE-2013-2435, CVE-2013-2437, CVE-2013-2440,
CVE-2013-2442, CVE-2013-2443, CVE-2013-2444, CVE-2013-2446,
CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451,
CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455,
CVE-2013-2456, CVE-2013-2457, CVE-2013-2459, CVE-2013-2463,
CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2468,
CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472,
CVE-2013-2473, CVE-2013-3743)
Users of Red Hat Network Satellite Server 5.4 are advised to upgrade
to these updated packages, which contain the IBM Java SE 6 SR14
release. For this update to take effect, Red Hat Network Satellite
Server must be restarted ('/usr/sbin/rhn-satellite restart'), as well
as all running instances of IBM Java.");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2013:1455");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-0869");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-0868");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-0865");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-0867");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-0862");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-0871");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-0873");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-0863");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-0814");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-0802");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3521");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3554");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3556");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3548");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3551");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3552");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3553");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3389");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3547");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3560");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3544");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3557");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3549");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3550");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3546");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3545");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3561");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3516");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-5035");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0505");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2011-3563");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0506");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0497");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0503");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0502");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0501");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0500");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0499");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0498");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0507");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1725");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1719");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1718");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1717");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1716");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1713");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1722");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0551");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1721");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-0547");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1682");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5084");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5079");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5081");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5069");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5068");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-3216");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5071");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5072");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5073");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5089");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5075");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-3159");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-3143");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1531");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1533");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1532");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-5083");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-4820");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-4822");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-4823");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1478");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0450");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1473");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1476");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-1541");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0409");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1480");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1481");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0427");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0426");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0425");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0424");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0423");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-3213");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0419");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0445");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0446");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0441");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0440");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0443");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0442");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0351");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2012-3342");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0432");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0433");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0434");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0435");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0438");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0428");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0169");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1486");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1487");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1493");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0809");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2418");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2394");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2432");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2433");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2435");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1540");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1563");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2419");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1537");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2417");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2430");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-0401");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1569");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2383");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2384");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2420");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2422");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2424");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2429");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1557");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2440");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1491");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2465");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1571");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2472");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2412");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2454");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2455");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2456");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2457");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2450");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2452");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2453");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2459");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2470");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2471");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2473");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2447");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2446");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2463");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2407");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-1500");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2448");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2469");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2443");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2444");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2451");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2464");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2468");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2442");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2466");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-2437");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2013-3743");
script_set_attribute(attribute:"solution", value:
"Update the affected java-1.6.0-ibm and / or java-1.6.0-ibm-devel
packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-2473");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Java storeImageArray() Invalid Array Indexing Vulnerability');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
script_set_attribute(attribute:"canvas_package", value:"CANVAS");
script_set_attribute(attribute:"in_the_news", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2011/06/14");
script_set_attribute(attribute:"patch_publication_date", value:"2013/10/23");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/11/08");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Red Hat Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2014-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x / 6.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2013:1455";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (! (rpm_exists(release:"RHEL5", rpm:"spacewalk-admin-") || rpm_exists(release:"RHEL6", rpm:"spacewalk-admin-"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "Satellite Server");
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"java-1.6.0-ibm-1.6.0.14.0-1jpp.1.el5_9")) flag++;
if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"java-1.6.0-ibm-1.6.0.14.0-1jpp.1.el5_9")) flag++;
if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"java-1.6.0-ibm-1.6.0.14.0-1jpp.1.el5_9")) flag++;
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"java-1.6.0-ibm-devel-1.6.0.14.0-1jpp.1.el5_9")) flag++;
if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"java-1.6.0-ibm-devel-1.6.0.14.0-1jpp.1.el5_9")) flag++;
if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"java-1.6.0-ibm-devel-1.6.0.14.0-1jpp.1.el5_9")) flag++;
if (rpm_check(release:"RHEL6", cpu:"s390x", reference:"java-1.6.0-ibm-1.6.0.14.0-1jpp.1.el6_4")) flag++;
if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"java-1.6.0-ibm-1.6.0.14.0-1jpp.1.el6_4")) flag++;
if (rpm_check(release:"RHEL6", cpu:"s390x", reference:"java-1.6.0-ibm-devel-1.6.0.14.0-1jpp.1.el6_4")) flag++;
if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"java-1.6.0-ibm-devel-1.6.0.14.0-1jpp.1.el6_4")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get() + redhat_report_package_caveat()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "java-1.6.0-ibm / java-1.6.0-ibm-devel");
}
}
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | enterprise_linux | java-1.6.0-ibm | p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm |
redhat | enterprise_linux | java-1.6.0-ibm-devel | p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel |
redhat | enterprise_linux | 5 | cpe:/o:redhat:enterprise_linux:5 |
redhat | enterprise_linux | 6 | cpe:/o:redhat:enterprise_linux:6 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0865
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0868
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0869
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0871
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0873
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3516
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3521
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3544
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3545
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3546
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3547
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3548
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3549
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3550
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3551
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3552
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3553
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3554
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3556
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3557
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3560
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3561
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3563
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0497
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0498
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0502
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0503
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0505
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0506
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0507
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0547
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0551
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1532
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1533
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1541
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1682
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1716
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1721
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1722
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1725
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3143
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3159
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3213
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3216
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3342
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4820
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5068
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5069
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5071
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5072
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5073
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5075
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5079
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5083
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5084
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5089
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0351
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0409
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0419
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0423
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0424
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0425
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0426
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0427
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0428
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0432
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0433
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0434
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0438
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0440
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0441
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0445
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0446
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0450
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1476
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1478
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1480
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1481
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1486
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1487
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1491
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1540
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1563
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2394
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2418
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2432
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2433
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2437
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2440
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2466
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2468
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3743
access.redhat.com/errata/RHSA-2013:1455
access.redhat.com/security/cve/cve-2011-0802
access.redhat.com/security/cve/cve-2011-0814
access.redhat.com/security/cve/cve-2011-0862
access.redhat.com/security/cve/cve-2011-0863
access.redhat.com/security/cve/cve-2011-0865
access.redhat.com/security/cve/cve-2011-0867
access.redhat.com/security/cve/cve-2011-0868
access.redhat.com/security/cve/cve-2011-0869
access.redhat.com/security/cve/cve-2011-0871
access.redhat.com/security/cve/cve-2011-0873
access.redhat.com/security/cve/cve-2011-3389
access.redhat.com/security/cve/cve-2011-3516
access.redhat.com/security/cve/cve-2011-3521
access.redhat.com/security/cve/cve-2011-3544
access.redhat.com/security/cve/cve-2011-3545
access.redhat.com/security/cve/cve-2011-3546
access.redhat.com/security/cve/cve-2011-3547
access.redhat.com/security/cve/cve-2011-3548
access.redhat.com/security/cve/cve-2011-3549
access.redhat.com/security/cve/cve-2011-3550
access.redhat.com/security/cve/cve-2011-3551
access.redhat.com/security/cve/cve-2011-3552
access.redhat.com/security/cve/cve-2011-3553
access.redhat.com/security/cve/cve-2011-3554
access.redhat.com/security/cve/cve-2011-3556
access.redhat.com/security/cve/cve-2011-3557
access.redhat.com/security/cve/cve-2011-3560
access.redhat.com/security/cve/cve-2011-3561
access.redhat.com/security/cve/cve-2011-3563
access.redhat.com/security/cve/cve-2011-5035
access.redhat.com/security/cve/cve-2012-0497
access.redhat.com/security/cve/cve-2012-0498
access.redhat.com/security/cve/cve-2012-0499
access.redhat.com/security/cve/cve-2012-0500
access.redhat.com/security/cve/cve-2012-0501
access.redhat.com/security/cve/cve-2012-0502
access.redhat.com/security/cve/cve-2012-0503
access.redhat.com/security/cve/cve-2012-0505
access.redhat.com/security/cve/cve-2012-0506
access.redhat.com/security/cve/cve-2012-0507
access.redhat.com/security/cve/cve-2012-0547
access.redhat.com/security/cve/cve-2012-0551
access.redhat.com/security/cve/cve-2012-1531
access.redhat.com/security/cve/cve-2012-1532
access.redhat.com/security/cve/cve-2012-1533
access.redhat.com/security/cve/cve-2012-1541
access.redhat.com/security/cve/cve-2012-1682
access.redhat.com/security/cve/cve-2012-1713
access.redhat.com/security/cve/cve-2012-1716
access.redhat.com/security/cve/cve-2012-1717
access.redhat.com/security/cve/cve-2012-1718
access.redhat.com/security/cve/cve-2012-1719
access.redhat.com/security/cve/cve-2012-1721
access.redhat.com/security/cve/cve-2012-1722
access.redhat.com/security/cve/cve-2012-1725
access.redhat.com/security/cve/cve-2012-3143
access.redhat.com/security/cve/cve-2012-3159
access.redhat.com/security/cve/cve-2012-3213
access.redhat.com/security/cve/cve-2012-3216
access.redhat.com/security/cve/cve-2012-3342
access.redhat.com/security/cve/cve-2012-4820
access.redhat.com/security/cve/cve-2012-4822
access.redhat.com/security/cve/cve-2012-4823
access.redhat.com/security/cve/cve-2012-5068
access.redhat.com/security/cve/cve-2012-5069
access.redhat.com/security/cve/cve-2012-5071
access.redhat.com/security/cve/cve-2012-5072
access.redhat.com/security/cve/cve-2012-5073
access.redhat.com/security/cve/cve-2012-5075
access.redhat.com/security/cve/cve-2012-5079
access.redhat.com/security/cve/cve-2012-5081
access.redhat.com/security/cve/cve-2012-5083
access.redhat.com/security/cve/cve-2012-5084
access.redhat.com/security/cve/cve-2012-5089
access.redhat.com/security/cve/cve-2013-0169
access.redhat.com/security/cve/cve-2013-0351
access.redhat.com/security/cve/cve-2013-0401
access.redhat.com/security/cve/cve-2013-0409
access.redhat.com/security/cve/cve-2013-0419
access.redhat.com/security/cve/cve-2013-0423
access.redhat.com/security/cve/cve-2013-0424
access.redhat.com/security/cve/cve-2013-0425
access.redhat.com/security/cve/cve-2013-0426
access.redhat.com/security/cve/cve-2013-0427
access.redhat.com/security/cve/cve-2013-0428
access.redhat.com/security/cve/cve-2013-0432
access.redhat.com/security/cve/cve-2013-0433
access.redhat.com/security/cve/cve-2013-0434
access.redhat.com/security/cve/cve-2013-0435
access.redhat.com/security/cve/cve-2013-0438
access.redhat.com/security/cve/cve-2013-0440
access.redhat.com/security/cve/cve-2013-0441
access.redhat.com/security/cve/cve-2013-0442
access.redhat.com/security/cve/cve-2013-0443
access.redhat.com/security/cve/cve-2013-0445
access.redhat.com/security/cve/cve-2013-0446
access.redhat.com/security/cve/cve-2013-0450
access.redhat.com/security/cve/cve-2013-0809
access.redhat.com/security/cve/cve-2013-1473
access.redhat.com/security/cve/cve-2013-1476
access.redhat.com/security/cve/cve-2013-1478
access.redhat.com/security/cve/cve-2013-1480
access.redhat.com/security/cve/cve-2013-1481
access.redhat.com/security/cve/cve-2013-1486
access.redhat.com/security/cve/cve-2013-1487
access.redhat.com/security/cve/cve-2013-1491
access.redhat.com/security/cve/cve-2013-1493
access.redhat.com/security/cve/cve-2013-1500
access.redhat.com/security/cve/cve-2013-1537
access.redhat.com/security/cve/cve-2013-1540
access.redhat.com/security/cve/cve-2013-1557
access.redhat.com/security/cve/cve-2013-1563
access.redhat.com/security/cve/cve-2013-1569
access.redhat.com/security/cve/cve-2013-1571
access.redhat.com/security/cve/cve-2013-2383
access.redhat.com/security/cve/cve-2013-2384
access.redhat.com/security/cve/cve-2013-2394
access.redhat.com/security/cve/cve-2013-2407
access.redhat.com/security/cve/cve-2013-2412
access.redhat.com/security/cve/cve-2013-2417
access.redhat.com/security/cve/cve-2013-2418
access.redhat.com/security/cve/cve-2013-2419
access.redhat.com/security/cve/cve-2013-2420
access.redhat.com/security/cve/cve-2013-2422
access.redhat.com/security/cve/cve-2013-2424
access.redhat.com/security/cve/cve-2013-2429
access.redhat.com/security/cve/cve-2013-2430
access.redhat.com/security/cve/cve-2013-2432
access.redhat.com/security/cve/cve-2013-2433
access.redhat.com/security/cve/cve-2013-2435
access.redhat.com/security/cve/cve-2013-2437
access.redhat.com/security/cve/cve-2013-2440
access.redhat.com/security/cve/cve-2013-2442
access.redhat.com/security/cve/cve-2013-2443
access.redhat.com/security/cve/cve-2013-2444
access.redhat.com/security/cve/cve-2013-2446
access.redhat.com/security/cve/cve-2013-2447
access.redhat.com/security/cve/cve-2013-2448
access.redhat.com/security/cve/cve-2013-2450
access.redhat.com/security/cve/cve-2013-2451
access.redhat.com/security/cve/cve-2013-2452
access.redhat.com/security/cve/cve-2013-2453
access.redhat.com/security/cve/cve-2013-2454
access.redhat.com/security/cve/cve-2013-2455
access.redhat.com/security/cve/cve-2013-2456
access.redhat.com/security/cve/cve-2013-2457
access.redhat.com/security/cve/cve-2013-2459
access.redhat.com/security/cve/cve-2013-2463
access.redhat.com/security/cve/cve-2013-2464
access.redhat.com/security/cve/cve-2013-2465
access.redhat.com/security/cve/cve-2013-2466
access.redhat.com/security/cve/cve-2013-2468
access.redhat.com/security/cve/cve-2013-2469
access.redhat.com/security/cve/cve-2013-2470
access.redhat.com/security/cve/cve-2013-2471
access.redhat.com/security/cve/cve-2013-2472
access.redhat.com/security/cve/cve-2013-2473
access.redhat.com/security/cve/cve-2013-3743