CVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack.
CVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enfor ce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted applica tion.
CVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka 'two vulnerabilities'.
CVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka 'three vulnerabilities.'
CVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.
CVE-2007-5240: Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.
CVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274.
CVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update java-1_4_2-sun-4536.
#
# The text description of this plugin is (C) SUSE LLC.
#
include("compat.inc");
if (description)
{
script_id(27511);
script_version ("$Revision: 1.9 $");
script_cvs_date("$Date: 2014/06/13 20:11:35 $");
script_cve_id("CVE-2007-5232", "CVE-2007-5236", "CVE-2007-5237", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-5273", "CVE-2007-5274");
script_name(english:"openSUSE 10 Security Update : java-1_4_2-sun (java-1_4_2-sun-4536)");
script_summary(english:"Check for the java-1_4_2-sun-4536 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"The Sun JAVA JDK 1.4.2 was upgraded to release 16 to fix various bugs,
including the following security bugs :
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103 079-1
CVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK and JRE 6
Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and
JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when
applet caching is enabled, allows remote attackers to violate the
security model for an applet's outbound connections via a DNS
rebinding attack.
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103 073-1
CVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update 12 and
earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not
properly enfor ce access restrictions for untrusted applications,
which allows user-assisted remote attackers to read local files via an
untrusted applica tion.
CVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2 and
earlier does not properly enforce access restrictions for untrusted
applications, which allows user-assisted remote attackers to read and
modify local files via an untrusted application, aka 'two
vulnerabilities'.
CVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2 and
earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE
1.4.2_15 and earlier does not properly enforce access restrictions for
untrusted applications, which allows user-assisted remote attackers to
obtain sensitive information (the Java Web Start cache location) via
an untrusted application, aka 'three vulnerabilities.'
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103 072-1
CVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2 and
earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15
and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly
enforce access restrictions for untrusted (1) applications and (2)
applets, which allows user-assisted remote attackers to copy or rename
arbitrary files when local users perform drag-and-drop operations from
the untrusted application or applet window onto certain types of
desktop applications.
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103 071-1
CVE-2007-5240: Visual truncation vulnerability in the Java Runtime
Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0
Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier allows remote attackers to circumvent display
of the untrusted-code warning banner by creating a window larger than
the workstation screen.
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103 078-1
CVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK and JRE 6
Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and
JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when
an HTTP proxy server is used, allows remote attackers to violate the
security model for an applet's outbound connections via a multi-pin
DNS rebinding attack in which the applet download relies on DNS
resolution on the proxy server, but the applet's socket operations
rely on DNS resolution on the local machine, a different issue than
CVE-2007-5274.
CVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK and JRE 6
Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and
JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when
Firefox or Opera is used, allows remote attackers to violate the
security model for JavaScript outbound connections via a multi-pin DNS
rebinding attack dependent on the LiveConnect API, in which JavaScript
download relies on DNS resolution by the browser, but JavaScript
socket operations rely on separate DNS resolution by a Java Virtual
Machine (JVM), a different issue than CVE-2007-5273."
);
script_set_attribute(
attribute:"see_also",
value:"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected java-1_4_2-sun packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:N");
script_cwe_id(264);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_4_2-sun");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_4_2-sun-alsa");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_4_2-sun-demo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_4_2-sun-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_4_2-sun-jdbc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_4_2-sun-plugin");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:java-1_4_2-sun-src");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.1");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.2");
script_set_attribute(attribute:"patch_publication_date", value:"2007/10/11");
script_set_attribute(attribute:"plugin_publication_date", value:"2007/10/18");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE10\.1|SUSE10\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "10.1 / 10.2", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686)$") audit(AUDIT_ARCH_NOT, "i586 / i686", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE10.1", reference:"java-1_4_2-sun-1.4.2.16-0.2") ) flag++;
if ( rpm_check(release:"SUSE10.1", reference:"java-1_4_2-sun-alsa-1.4.2.16-0.2") ) flag++;
if ( rpm_check(release:"SUSE10.1", reference:"java-1_4_2-sun-demo-1.4.2.16-0.2") ) flag++;
if ( rpm_check(release:"SUSE10.1", reference:"java-1_4_2-sun-devel-1.4.2.16-0.2") ) flag++;
if ( rpm_check(release:"SUSE10.1", reference:"java-1_4_2-sun-jdbc-1.4.2.16-0.2") ) flag++;
if ( rpm_check(release:"SUSE10.1", reference:"java-1_4_2-sun-plugin-1.4.2.16-0.2") ) flag++;
if ( rpm_check(release:"SUSE10.1", reference:"java-1_4_2-sun-src-1.4.2.16-0.2") ) flag++;
if ( rpm_check(release:"SUSE10.2", reference:"java-1_4_2-sun-1.4.2_update16-0.1") ) flag++;
if ( rpm_check(release:"SUSE10.2", reference:"java-1_4_2-sun-alsa-1.4.2_update16-0.1") ) flag++;
if ( rpm_check(release:"SUSE10.2", reference:"java-1_4_2-sun-demo-1.4.2_update16-0.1") ) flag++;
if ( rpm_check(release:"SUSE10.2", reference:"java-1_4_2-sun-devel-1.4.2_update16-0.1") ) flag++;
if ( rpm_check(release:"SUSE10.2", reference:"java-1_4_2-sun-jdbc-1.4.2_update16-0.1") ) flag++;
if ( rpm_check(release:"SUSE10.2", reference:"java-1_4_2-sun-plugin-1.4.2_update16-0.1") ) flag++;
if ( rpm_check(release:"SUSE10.2", reference:"java-1_4_2-sun-src-1.4.2_update16-0.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "java-1_4_2-sun");
}
{"id": "SUSE_JAVA-1_4_2-SUN-4536.NASL", "bulletinFamily": "scanner", "title": "openSUSE 10 Security Update : java-1_4_2-sun (java-1_4_2-sun-4536)", "description": "The Sun JAVA JDK 1.4.2 was upgraded to release 16 to fix various bugs, including the following security bugs :\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 079-1\n\nCVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 073-1\n\nCVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enfor ce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted applica tion.\n\nCVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka 'two vulnerabilities'.\n\nCVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka 'three vulnerabilities.'\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 072-1\n\nCVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 071-1\n\nCVE-2007-5240: Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 078-1\n\nCVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274.\n\nCVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273.", "published": "2007-10-18T00:00:00", "modified": "2014-06-13T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=27511", "reporter": "Tenable", "references": ["http://sunsolve.sun.com/search/document.do?assetkey=1-26-103"], "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "type": "nessus", "lastseen": "2017-10-29T13:38:32", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "description": "The Sun JAVA JDK 1.4.2 was upgraded to release 16 to fix various bugs, including the following security bugs :\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 079-1\n\nCVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 073-1\n\nCVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enfor ce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted applica tion.\n\nCVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka 'two vulnerabilities'.\n\nCVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka 'three vulnerabilities.'\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 072-1\n\nCVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 071-1\n\nCVE-2007-5240: Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 078-1\n\nCVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274.\n\nCVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273.", "edition": 1, "enchantments": {}, "hash": "5b1ab981106662538b78c86dec5ca01f757c940e851a11d2bfc8f1e288b1954a", "hashmap": [{"hash": "75faad22045a33190a3c052d75c092e4", "key": "href"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "118b7d8a0b344a299e1f2959d10135be", "key": "sourceData"}, {"hash": "7649722c82bbcc62bdb39a500944d696", "key": "references"}, {"hash": "02fcc0c238d215158fbaabb854c5b3df", "key": "modified"}, {"hash": "46e19e37aff849b754a7053677b14c82", "key": "title"}, {"hash": "e2d9fd0ef97cd0306514701ae05ead2a", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "71a40666da62ba38d22539c8277870c7", "key": "naslFamily"}, {"hash": "25877ed99b949b57ee5ba4a0fd5c4930", "key": "cvelist"}, {"hash": "b5daaa1a65fab780763c6dc7df93d38b", "key": "pluginID"}, {"hash": "e8ddad3788979eefe7312acd699725ea", "key": "published"}, {"hash": "9d9b93c7d6e6aa8a4c31efec781be6d2", "key": "description"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=27511", "id": "SUSE_JAVA-1_4_2-SUN-4536.NASL", "lastseen": "2016-09-26T17:24:43", "modified": "2014-06-13T00:00:00", "naslFamily": "SuSE Local Security Checks", "objectVersion": "1.2", "pluginID": "27511", "published": "2007-10-18T00:00:00", "references": ["http://sunsolve.sun.com/search/document.do?assetkey=1-26-103"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update java-1_4_2-sun-4536.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(27511);\n script_version (\"$Revision: 1.9 $\");\n script_cvs_date(\"$Date: 2014/06/13 20:11:35 $\");\n\n script_cve_id(\"CVE-2007-5232\", \"CVE-2007-5236\", \"CVE-2007-5237\", \"CVE-2007-5238\", \"CVE-2007-5239\", \"CVE-2007-5240\", \"CVE-2007-5273\", \"CVE-2007-5274\");\n\n script_name(english:\"openSUSE 10 Security Update : java-1_4_2-sun (java-1_4_2-sun-4536)\");\n script_summary(english:\"Check for the java-1_4_2-sun-4536 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Sun JAVA JDK 1.4.2 was upgraded to release 16 to fix various bugs,\nincluding the following security bugs :\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 079-1\n\nCVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK and JRE 6\nUpdate 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and\nJRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when\napplet caching is enabled, allows remote attackers to violate the\nsecurity model for an applet's outbound connections via a DNS\nrebinding attack.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 073-1\n\nCVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update 12 and\nearlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not\nproperly enfor ce access restrictions for untrusted applications,\nwhich allows user-assisted remote attackers to read local files via an\nuntrusted applica tion.\n\nCVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2 and\nearlier does not properly enforce access restrictions for untrusted\napplications, which allows user-assisted remote attackers to read and\nmodify local files via an untrusted application, aka 'two\nvulnerabilities'.\n\nCVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2 and\nearlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE\n1.4.2_15 and earlier does not properly enforce access restrictions for\nuntrusted applications, which allows user-assisted remote attackers to\nobtain sensitive information (the Java Web Start cache location) via\nan untrusted application, aka 'three vulnerabilities.'\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 072-1\n\nCVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2 and\nearlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15\nand earlier, and SDK and JRE 1.3.1_20 and earlier does not properly\nenforce access restrictions for untrusted (1) applications and (2)\napplets, which allows user-assisted remote attackers to copy or rename\narbitrary files when local users perform drag-and-drop operations from\nthe untrusted application or applet window onto certain types of\ndesktop applications.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 071-1\n\nCVE-2007-5240: Visual truncation vulnerability in the Java Runtime\nEnvironment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0\nUpdate 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and\nJRE 1.3.1_20 and earlier allows remote attackers to circumvent display\nof the untrusted-code warning banner by creating a window larger than\nthe workstation screen.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 078-1\n\nCVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK and JRE 6\nUpdate 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and\nJRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when\nan HTTP proxy server is used, allows remote attackers to violate the\nsecurity model for an applet's outbound connections via a multi-pin\nDNS rebinding attack in which the applet download relies on DNS\nresolution on the proxy server, but the applet's socket operations\nrely on DNS resolution on the local machine, a different issue than\nCVE-2007-5274.\n\nCVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK and JRE 6\nUpdate 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and\nJRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when\nFirefox or Opera is used, allows remote attackers to violate the\nsecurity model for JavaScript outbound connections via a multi-pin DNS\nrebinding attack dependent on the LiveConnect API, in which JavaScript\ndownload relies on DNS resolution by the browser, but JavaScript\nsocket operations rely on separate DNS resolution by a Java Virtual\nMachine (JVM), a different issue than CVE-2007-5273.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected java-1_4_2-sun packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:N\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-demo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-src\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/10/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-alsa-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-demo-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-devel-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-jdbc-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-plugin-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-src-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-alsa-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-demo-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-devel-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-jdbc-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-plugin-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-src-1.4.2_update16-0.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_4_2-sun\");\n}\n", "title": "openSUSE 10 Security Update : java-1_4_2-sun (java-1_4_2-sun-4536)", "type": "nessus", "viewCount": 0}, "differentElements": ["cpe"], "edition": 1, "lastseen": "2016-09-26T17:24:43"}], "edition": 2, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "82a1eec003d872ae743243fa7d287074"}, {"key": "cvelist", "hash": "25877ed99b949b57ee5ba4a0fd5c4930"}, {"key": "cvss", "hash": "e2d9fd0ef97cd0306514701ae05ead2a"}, {"key": "description", "hash": "9d9b93c7d6e6aa8a4c31efec781be6d2"}, {"key": "href", "hash": "75faad22045a33190a3c052d75c092e4"}, {"key": "modified", "hash": "02fcc0c238d215158fbaabb854c5b3df"}, {"key": "naslFamily", "hash": "71a40666da62ba38d22539c8277870c7"}, {"key": "pluginID", "hash": "b5daaa1a65fab780763c6dc7df93d38b"}, {"key": "published", "hash": "e8ddad3788979eefe7312acd699725ea"}, {"key": "references", "hash": "7649722c82bbcc62bdb39a500944d696"}, {"key": "reporter", "hash": "9cf00d658b687f030ebe173a0528c567"}, {"key": "sourceData", "hash": "118b7d8a0b344a299e1f2959d10135be"}, {"key": "title", "hash": "46e19e37aff849b754a7053677b14c82"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "1e550392a04a6d2c5c0e872b3f0f53890804df855fe34a54e94680ba6c93c911", "viewCount": 0, "enchantments": {"vulnersScore": 5.0}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update java-1_4_2-sun-4536.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(27511);\n script_version (\"$Revision: 1.9 $\");\n script_cvs_date(\"$Date: 2014/06/13 20:11:35 $\");\n\n script_cve_id(\"CVE-2007-5232\", \"CVE-2007-5236\", \"CVE-2007-5237\", \"CVE-2007-5238\", \"CVE-2007-5239\", \"CVE-2007-5240\", \"CVE-2007-5273\", \"CVE-2007-5274\");\n\n script_name(english:\"openSUSE 10 Security Update : java-1_4_2-sun (java-1_4_2-sun-4536)\");\n script_summary(english:\"Check for the java-1_4_2-sun-4536 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Sun JAVA JDK 1.4.2 was upgraded to release 16 to fix various bugs,\nincluding the following security bugs :\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 079-1\n\nCVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK and JRE 6\nUpdate 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and\nJRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when\napplet caching is enabled, allows remote attackers to violate the\nsecurity model for an applet's outbound connections via a DNS\nrebinding attack.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 073-1\n\nCVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update 12 and\nearlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not\nproperly enfor ce access restrictions for untrusted applications,\nwhich allows user-assisted remote attackers to read local files via an\nuntrusted applica tion.\n\nCVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2 and\nearlier does not properly enforce access restrictions for untrusted\napplications, which allows user-assisted remote attackers to read and\nmodify local files via an untrusted application, aka 'two\nvulnerabilities'.\n\nCVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2 and\nearlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE\n1.4.2_15 and earlier does not properly enforce access restrictions for\nuntrusted applications, which allows user-assisted remote attackers to\nobtain sensitive information (the Java Web Start cache location) via\nan untrusted application, aka 'three vulnerabilities.'\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 072-1\n\nCVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2 and\nearlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15\nand earlier, and SDK and JRE 1.3.1_20 and earlier does not properly\nenforce access restrictions for untrusted (1) applications and (2)\napplets, which allows user-assisted remote attackers to copy or rename\narbitrary files when local users perform drag-and-drop operations from\nthe untrusted application or applet window onto certain types of\ndesktop applications.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 071-1\n\nCVE-2007-5240: Visual truncation vulnerability in the Java Runtime\nEnvironment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0\nUpdate 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and\nJRE 1.3.1_20 and earlier allows remote attackers to circumvent display\nof the untrusted-code warning banner by creating a window larger than\nthe workstation screen.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 078-1\n\nCVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK and JRE 6\nUpdate 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and\nJRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when\nan HTTP proxy server is used, allows remote attackers to violate the\nsecurity model for an applet's outbound connections via a multi-pin\nDNS rebinding attack in which the applet download relies on DNS\nresolution on the proxy server, but the applet's socket operations\nrely on DNS resolution on the local machine, a different issue than\nCVE-2007-5274.\n\nCVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK and JRE 6\nUpdate 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and\nJRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when\nFirefox or Opera is used, allows remote attackers to violate the\nsecurity model for JavaScript outbound connections via a multi-pin DNS\nrebinding attack dependent on the LiveConnect API, in which JavaScript\ndownload relies on DNS resolution by the browser, but JavaScript\nsocket operations rely on separate DNS resolution by a Java Virtual\nMachine (JVM), a different issue than CVE-2007-5273.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected java-1_4_2-sun packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:N\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-demo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:java-1_4_2-sun-src\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/10/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-alsa-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-demo-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-devel-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-jdbc-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-plugin-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"java-1_4_2-sun-src-1.4.2.16-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-alsa-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-demo-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-devel-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-jdbc-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-plugin-1.4.2_update16-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"java-1_4_2-sun-src-1.4.2_update16-0.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_4_2-sun\");\n}\n", "naslFamily": "SuSE Local Security Checks", "pluginID": "27511", "cpe": ["cpe:/o:novell:opensuse:10.2", "p-cpe:/a:novell:opensuse:java-1_4_2-sun-devel", "p-cpe:/a:novell:opensuse:java-1_4_2-sun-src", "p-cpe:/a:novell:opensuse:java-1_4_2-sun-demo", "cpe:/o:novell:opensuse:10.1", "p-cpe:/a:novell:opensuse:java-1_4_2-sun-plugin", "p-cpe:/a:novell:opensuse:java-1_4_2-sun-alsa", "p-cpe:/a:novell:opensuse:java-1_4_2-sun-jdbc", "p-cpe:/a:novell:opensuse:java-1_4_2-sun"]}
{"result": {"cve": [{"id": "CVE-2007-5238", "type": "cve", "title": "CVE-2007-5238", "description": "Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka \"three vulnerabilities.\"", "published": "2007-10-05T20:17:00", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5238", "cvelist": ["CVE-2007-5238"], "lastseen": "2017-09-29T14:25:32"}, {"id": "CVE-2007-5232", "type": "cve", "title": "CVE-2007-5232", "description": "Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack.", "published": "2007-10-05T19:17:00", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5232", "cvelist": ["CVE-2007-5232"], "lastseen": "2017-09-29T14:25:32"}, {"id": "CVE-2007-5240", "type": "cve", "title": "CVE-2007-5240", "description": "Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.", "published": "2007-10-05T20:17:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5240", "cvelist": ["CVE-2007-5240"], "lastseen": "2017-09-29T14:25:32"}, {"id": "CVE-2007-5237", "type": "cve", "title": "CVE-2007-5237", "description": "Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka \"two vulnerabilities.\"", "published": "2007-10-05T20:17:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5237", "cvelist": ["CVE-2007-5237"], "lastseen": "2017-09-29T14:25:32"}, {"id": "CVE-2007-5236", "type": "cve", "title": "CVE-2007-5236", "description": "Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted application.", "published": "2007-10-05T20:17:00", "cvss": {"score": 5.4, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5236", "cvelist": ["CVE-2007-5236"], "lastseen": "2017-09-29T14:25:32"}, {"id": "CVE-2007-5273", "type": "cve", "title": "CVE-2007-5273", "description": "Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.", "published": "2007-10-08T19:17:00", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5273", "cvelist": ["CVE-2007-5273"], "lastseen": "2017-09-29T14:25:33"}, {"id": "CVE-2007-5239", "type": "cve", "title": "CVE-2007-5239", "description": "Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.", "published": "2007-10-05T20:17:00", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5239", "cvelist": ["CVE-2007-5239"], "lastseen": "2017-09-29T14:25:32"}, {"id": "CVE-2007-5274", "type": "cve", "title": "CVE-2007-5274", "description": "Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273. NOTE: this is similar to CVE-2007-5232.", "published": "2007-10-08T19:17:00", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5274", "cvelist": ["CVE-2007-5274"], "lastseen": "2017-09-29T14:25:33"}], "osvdb": [{"id": "OSVDB:37762", "type": "osvdb", "title": "Sun Java JRE / JDK Multiple Unspecified Information Disclosure", "description": "# No description provided by the source\n\n## References:\nVendor Specific Solution URL: http://sunsolve.sun.com/search/document.do?assetkey=1-26-103073-1\nSecurity Tracker: 1018770\n[Secunia Advisory ID:27009](https://secuniaresearch.flexerasoftware.com/advisories/27009/)\n[Secunia Advisory ID:27206](https://secuniaresearch.flexerasoftware.com/advisories/27206/)\n[Secunia Advisory ID:27716](https://secuniaresearch.flexerasoftware.com/advisories/27716/)\n[Secunia Advisory ID:27804](https://secuniaresearch.flexerasoftware.com/advisories/27804/)\n[Secunia Advisory ID:27261](https://secuniaresearch.flexerasoftware.com/advisories/27261/)\n[Secunia Advisory ID:27693](https://secuniaresearch.flexerasoftware.com/advisories/27693/)\n[Related OSVDB ID: 37761](https://vulners.com/osvdb/OSVDB:37761)\n[Related OSVDB ID: 37763](https://vulners.com/osvdb/OSVDB:37763)\n[Related OSVDB ID: 37764](https://vulners.com/osvdb/OSVDB:37764)\n[Related OSVDB ID: 37765](https://vulners.com/osvdb/OSVDB:37765)\n[Related OSVDB ID: 37759](https://vulners.com/osvdb/OSVDB:37759)\n[Related OSVDB ID: 37760](https://vulners.com/osvdb/OSVDB:37760)\nRedHat RHSA: RHSA-2007:0963\nRedHat RHSA: RHSA-2007:1041\nOther Advisory URL: http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\nOther Advisory URL: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533\nOther Advisory URL: http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00004.html\nOther Advisory URL: HPSBUX02284 SSRT071483:\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2007_55_java.html\nISS X-Force ID: 36946\nFrSIRT Advisory: ADV-2007-3895\n[CVE-2007-5238](https://vulners.com/cve/CVE-2007-5238)\nBugtraq ID: 25920\n", "published": "2007-10-03T18:28:55", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://vulners.com/osvdb/OSVDB:37762", "cvelist": ["CVE-2007-5238"], "lastseen": "2017-04-28T13:20:33"}, {"id": "OSVDB:37765", "type": "osvdb", "title": "Sun Java JRE / JDK Applet Outbound DNS Rebinding Issue", "description": "# No description provided by the source\n\n## References:\nVendor Specific News/Changelog Entry: http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\n[Vendor Specific Advisory URL](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103079-1)\nSecurity Tracker: 1018768\n[Secunia Advisory ID:27009](https://secuniaresearch.flexerasoftware.com/advisories/27009/)\n[Secunia Advisory ID:28115](https://secuniaresearch.flexerasoftware.com/advisories/28115/)\n[Secunia Advisory ID:27206](https://secuniaresearch.flexerasoftware.com/advisories/27206/)\n[Secunia Advisory ID:27716](https://secuniaresearch.flexerasoftware.com/advisories/27716/)\n[Secunia Advisory ID:27804](https://secuniaresearch.flexerasoftware.com/advisories/27804/)\n[Secunia Advisory ID:27261](https://secuniaresearch.flexerasoftware.com/advisories/27261/)\n[Secunia Advisory ID:27693](https://secuniaresearch.flexerasoftware.com/advisories/27693/)\n[Related OSVDB ID: 37761](https://vulners.com/osvdb/OSVDB:37761)\n[Related OSVDB ID: 37762](https://vulners.com/osvdb/OSVDB:37762)\n[Related OSVDB ID: 37763](https://vulners.com/osvdb/OSVDB:37763)\n[Related OSVDB ID: 37764](https://vulners.com/osvdb/OSVDB:37764)\n[Related OSVDB ID: 37759](https://vulners.com/osvdb/OSVDB:37759)\n[Related OSVDB ID: 37760](https://vulners.com/osvdb/OSVDB:37760)\nRedHat RHSA: RHSA-2007:0963\nRedHat RHSA: RHSA-2007:1041\nOther Advisory URL: http://conference.hitb.org/hitbsecconf2007kl/materials/D2T1%20-%20Billy%20Rios%20-%20Slipping%20Past%20the%20Firewall.pdf\nOther Advisory URL: http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html\nOther Advisory URL: http://conference.hitb.org/hitbsecconf2007kl/?page_id=148\nOther Advisory URL: http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\nOther Advisory URL: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533\nOther Advisory URL: http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00004.html\nOther Advisory URL: HPSBUX02284 SSRT071483:\nOther Advisory URL: http://docs.info.apple.com/article.html?artnum=307177\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2007_55_java.html\nISS X-Force ID: 36941\nFrSIRT Advisory: ADV-2007-4224\nFrSIRT Advisory: ADV-2007-3895\n[CVE-2007-5232](https://vulners.com/cve/CVE-2007-5232)\nCERT VU: 336105\nBugtraq ID: 25918\n", "published": "2007-10-03T18:28:55", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "href": "https://vulners.com/osvdb/OSVDB:37765", "cvelist": ["CVE-2007-5232"], "lastseen": "2017-04-28T13:20:33"}, {"id": "OSVDB:37760", "type": "osvdb", "title": "Sun Java JRE / JDK Untrusted-code Warning Banner Display Bypass", "description": "# No description provided by the source\n\n## References:\nSecurity Tracker: 1018769\n[Secunia Advisory ID:27009](https://secuniaresearch.flexerasoftware.com/advisories/27009/)\n[Secunia Advisory ID:27206](https://secuniaresearch.flexerasoftware.com/advisories/27206/)\n[Secunia Advisory ID:27716](https://secuniaresearch.flexerasoftware.com/advisories/27716/)\n[Secunia Advisory ID:27804](https://secuniaresearch.flexerasoftware.com/advisories/27804/)\n[Secunia Advisory ID:27261](https://secuniaresearch.flexerasoftware.com/advisories/27261/)\n[Secunia Advisory ID:27693](https://secuniaresearch.flexerasoftware.com/advisories/27693/)\n[Related OSVDB ID: 37761](https://vulners.com/osvdb/OSVDB:37761)\n[Related OSVDB ID: 37762](https://vulners.com/osvdb/OSVDB:37762)\n[Related OSVDB ID: 37763](https://vulners.com/osvdb/OSVDB:37763)\n[Related OSVDB ID: 37764](https://vulners.com/osvdb/OSVDB:37764)\n[Related OSVDB ID: 37765](https://vulners.com/osvdb/OSVDB:37765)\n[Related OSVDB ID: 37759](https://vulners.com/osvdb/OSVDB:37759)\nRedHat RHSA: RHSA-2007:0963\nRedHat RHSA: RHSA-2007:1041\nOther Advisory URL: http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\nOther Advisory URL: http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00004.html\nOther Advisory URL: HPSBUX02284 SSRT071483:\nISS X-Force ID: 36942\n[CVE-2007-5240](https://vulners.com/cve/CVE-2007-5240)\nBugtraq ID: 25918\n", "published": "2007-10-03T18:28:55", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://vulners.com/osvdb/OSVDB:37760", "cvelist": ["CVE-2007-5240"], "lastseen": "2017-04-28T13:20:33"}, {"id": "OSVDB:37763", "type": "osvdb", "title": "Sun Java JRE / JDK Untrusted Application Arbitrary File Manipulation", "description": "# No description provided by the source\n\n## References:\nVendor Specific Solution URL: http://sunsolve.sun.com/search/document.do?assetkey=1-26-103073-1\nSecurity Tracker: 1018770\n[Secunia Advisory ID:27009](https://secuniaresearch.flexerasoftware.com/advisories/27009/)\n[Secunia Advisory ID:27206](https://secuniaresearch.flexerasoftware.com/advisories/27206/)\n[Secunia Advisory ID:27261](https://secuniaresearch.flexerasoftware.com/advisories/27261/)\n[Secunia Advisory ID:27693](https://secuniaresearch.flexerasoftware.com/advisories/27693/)\n[Related OSVDB ID: 37761](https://vulners.com/osvdb/OSVDB:37761)\n[Related OSVDB ID: 37762](https://vulners.com/osvdb/OSVDB:37762)\n[Related OSVDB ID: 37764](https://vulners.com/osvdb/OSVDB:37764)\n[Related OSVDB ID: 37765](https://vulners.com/osvdb/OSVDB:37765)\n[Related OSVDB ID: 37759](https://vulners.com/osvdb/OSVDB:37759)\n[Related OSVDB ID: 37760](https://vulners.com/osvdb/OSVDB:37760)\nRedHat RHSA: RHSA-2007:0963\nOther Advisory URL: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533\nOther Advisory URL: http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00004.html\nOther Advisory URL: HPSBUX02284 SSRT071483:\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2007_55_java.html\nISS X-Force ID: 36946\nFrSIRT Advisory: ADV-2007-3895\n[CVE-2007-5237](https://vulners.com/cve/CVE-2007-5237)\nBugtraq ID: 25920\n", "published": "2007-10-03T18:28:55", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "href": "https://vulners.com/osvdb/OSVDB:37763", "cvelist": ["CVE-2007-5237"], "lastseen": "2017-04-28T13:20:33"}, {"id": "OSVDB:37764", "type": "osvdb", "title": "Sun Java JRE / JDK on Windows Untrusted Application Arbitrary File Access", "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103073-1)\n[Secunia Advisory ID:27009](https://secuniaresearch.flexerasoftware.com/advisories/27009/)\n[Secunia Advisory ID:27206](https://secuniaresearch.flexerasoftware.com/advisories/27206/)\n[Secunia Advisory ID:27716](https://secuniaresearch.flexerasoftware.com/advisories/27716/)\n[Secunia Advisory ID:27261](https://secuniaresearch.flexerasoftware.com/advisories/27261/)\n[Secunia Advisory ID:27693](https://secuniaresearch.flexerasoftware.com/advisories/27693/)\n[Related OSVDB ID: 37761](https://vulners.com/osvdb/OSVDB:37761)\n[Related OSVDB ID: 37762](https://vulners.com/osvdb/OSVDB:37762)\n[Related OSVDB ID: 37763](https://vulners.com/osvdb/OSVDB:37763)\n[Related OSVDB ID: 37765](https://vulners.com/osvdb/OSVDB:37765)\n[Related OSVDB ID: 37759](https://vulners.com/osvdb/OSVDB:37759)\n[Related OSVDB ID: 37760](https://vulners.com/osvdb/OSVDB:37760)\nRedHat RHSA: RHSA-2007:0963\nOther Advisory URL: http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\nOther Advisory URL: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533\nOther Advisory URL: http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00004.html\nOther Advisory URL: HPSBUX02284 SSRT071483:\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2007_55_java.html\nISS X-Force ID: 36946\nFrSIRT Advisory: ADV-2007-3895\n[CVE-2007-5236](https://vulners.com/cve/CVE-2007-5236)\nBugtraq ID: 25920\n", "published": "2007-10-03T18:28:55", "cvss": {"score": 5.4, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}, "href": "https://vulners.com/osvdb/OSVDB:37764", "cvelist": ["CVE-2007-5236"], "lastseen": "2017-04-28T13:20:33"}, {"id": "OSVDB:37761", "type": "osvdb", "title": "Sun Java JRE / JDK Local Drag-and-drop Operation Access Restriction Bypass", "description": "# No description provided by the source\n\n## References:\nVendor Specific Solution URL: http://sunsolve.sun.com/search/document.do?assetkey=1-26-103072-1\n[Secunia Advisory ID:27009](https://secuniaresearch.flexerasoftware.com/advisories/27009/)\n[Secunia Advisory ID:27206](https://secuniaresearch.flexerasoftware.com/advisories/27206/)\n[Secunia Advisory ID:27716](https://secuniaresearch.flexerasoftware.com/advisories/27716/)\n[Secunia Advisory ID:27804](https://secuniaresearch.flexerasoftware.com/advisories/27804/)\n[Secunia Advisory ID:27261](https://secuniaresearch.flexerasoftware.com/advisories/27261/)\n[Secunia Advisory ID:27693](https://secuniaresearch.flexerasoftware.com/advisories/27693/)\n[Related OSVDB ID: 37762](https://vulners.com/osvdb/OSVDB:37762)\n[Related OSVDB ID: 37763](https://vulners.com/osvdb/OSVDB:37763)\n[Related OSVDB ID: 37764](https://vulners.com/osvdb/OSVDB:37764)\n[Related OSVDB ID: 37765](https://vulners.com/osvdb/OSVDB:37765)\n[Related OSVDB ID: 37759](https://vulners.com/osvdb/OSVDB:37759)\n[Related OSVDB ID: 37760](https://vulners.com/osvdb/OSVDB:37760)\nRedHat RHSA: RHSA-2007:0963\nRedHat RHSA: RHSA-2007:1041\nOther Advisory URL: http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\nOther Advisory URL: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533\nOther Advisory URL: http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00004.html\nOther Advisory URL: HPSBUX02284 SSRT071483:\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2007_55_java.html\nISS X-Force ID: 36950\nFrSIRT Advisory: ADV-2007-3895\n[CVE-2007-5239](https://vulners.com/cve/CVE-2007-5239)\n", "published": "2007-10-03T18:28:55", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "href": "https://vulners.com/osvdb/OSVDB:37761", "cvelist": ["CVE-2007-5239"], "lastseen": "2017-04-28T13:20:33"}, {"id": "OSVDB:37759", "type": "osvdb", "title": "Sun Java JRE / JDK LiveConnect API DNS Rebinding Security Bypass", "description": "# No description provided by the source\n\n## References:\nSecurity Tracker: 1018771\n[Secunia Advisory ID:27009](https://secuniaresearch.flexerasoftware.com/advisories/27009/)\n[Secunia Advisory ID:27206](https://secuniaresearch.flexerasoftware.com/advisories/27206/)\n[Secunia Advisory ID:27716](https://secuniaresearch.flexerasoftware.com/advisories/27716/)\n[Secunia Advisory ID:27804](https://secuniaresearch.flexerasoftware.com/advisories/27804/)\n[Secunia Advisory ID:27261](https://secuniaresearch.flexerasoftware.com/advisories/27261/)\n[Secunia Advisory ID:27693](https://secuniaresearch.flexerasoftware.com/advisories/27693/)\n[Related OSVDB ID: 37761](https://vulners.com/osvdb/OSVDB:37761)\n[Related OSVDB ID: 37762](https://vulners.com/osvdb/OSVDB:37762)\n[Related OSVDB ID: 37763](https://vulners.com/osvdb/OSVDB:37763)\n[Related OSVDB ID: 37764](https://vulners.com/osvdb/OSVDB:37764)\n[Related OSVDB ID: 37765](https://vulners.com/osvdb/OSVDB:37765)\n[Related OSVDB ID: 37760](https://vulners.com/osvdb/OSVDB:37760)\nRedHat RHSA: RHSA-2007:0963\nRedHat RHSA: RHSA-2007:1041\nOther Advisory URL: http://crypto.stanford.edu/dns/dns-rebinding.pdf\nOther Advisory URL: http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html\nOther Advisory URL: http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00004.html\nOther Advisory URL: HPSBUX02284 SSRT071483:\n[CVE-2007-5274](https://vulners.com/cve/CVE-2007-5274)\nBugtraq ID: 25918\n", "published": "2007-10-03T18:28:55", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://vulners.com/osvdb/OSVDB:37759", "cvelist": ["CVE-2007-5274"], "lastseen": "2017-04-28T13:20:33"}], "nessus": [{"id": "REDHAT-RHSA-2007-1041.NASL", "type": "nessus", "title": "RHEL 4 / 5 : java-1.5.0-ibm (RHSA-2007:1041)", "description": "Updated java-1.5.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nIBM's 1.5.0 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit.\n\nThe applet caching mechanism of the Java Runtime Environment (JRE) did not correctly process the creation of network connections. A remote attacker could use this flaw to create connections to services on machines other than the one that the applet was downloaded from.\n(CVE-2007-5232)\n\nMultiple vulnerabilities existed in Java Web Start allowing an untrusted application to determine the location of the Java Web Start cache. (CVE-2007-5238)\n\nUntrusted Java Web Start Applications or Java Applets were able to drag and drop a file to a Desktop Application. A user-assisted remote attacker could use this flaw to move or copy arbitrary files.\n(CVE-2007-5239)\n\nThe Java Runtime Environment allowed untrusted Java Applets or applications to display oversized Windows. This could be used by remote attackers to hide security warning banners. (CVE-2007-5240)\n\nUnsigned Java Applets communicating via a HTTP proxy could allow a remote attacker to violate the Java security model. A cached malicious Applet could create network connections to services on other machines.\n(CVE-2007-5273)\n\nUnsigned Applets loaded with Mozilla Firefox or Opera browsers allowed remote attackers to violate the Java security model. A cached malicious Applet could create network connections to services on other machines. (CVE-2007-5274)\n\nAll users of java-ibm-1.5.0 are advised to upgrade to these updated packages, that contain IBM's 1.5.0 SR6 Java release which resolves these issues.", "published": "2009-08-24T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=40710", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-10-29T13:41:48"}, {"id": "SUSE_JAVA-1_6_0-SUN-4525.NASL", "type": "nessus", "title": "openSUSE 10 Security Update : java-1_6_0-sun (java-1_6_0-sun-4525)", "description": "The Sun JAVA JDK 1.6.0 was upgraded to release 3 to fix various bugs, including the following security bugs :\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 079-1\n\nCVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 073-1\n\nCVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enfor ce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted applica tion.\n\nCVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka 'two vulnerabilities'.\n\nCVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka 'three vulnerabilities.'\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 072-1\n\nCVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 071-1\n\nCVE-2007-5240: Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 078-1\n\nCVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274.\n\nCVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273.", "published": "2007-10-18T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=27513", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-10-29T13:34:08"}, {"id": "SUSE_JAVA-1_5_0-SUN-4527.NASL", "type": "nessus", "title": "openSUSE 10 Security Update : java-1_5_0-sun (java-1_5_0-sun-4527)", "description": "The Sun JAVA JDK 1.5.0 was upgraded to release 13 to fix various bugs, including the following security bugs :\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 079-1\n\nCVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 073-1\n\nCVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enfor ce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted applica tion.\n\nCVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka 'two vulnerabilities'.\n\nCVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka 'three vulnerabilities.'\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 072-1\n\nCVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 071-1\n\nCVE-2007-5240: Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103 078-1\n\nCVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274.\n\nCVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273.", "published": "2007-10-18T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=27512", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-10-29T13:38:12"}, {"id": "SUSE_JAVA-1_5_0-IBM-4687.NASL", "type": "nessus", "title": "SuSE 10 Security Update : java-1_5_0-ibm (ZYPP Patch Number 4687)", "description": "The IBM Java JRE/SDK has been brought to release 1.5.0 SR6, containing several bugfixes, including the following security fixes :\n\n - A vulnerability in the Java Runtime Environment (JRE) with applet caching may allow an untrusted applet that is downloaded from a malicious website to make network connections to network services on machines other than the one that the applet was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited. (CVE-2007-5232)\n\n - A vulnerability in the Java Runtime Environment (JRE) may allow malicious JavaScript code that is downloaded by a browser from a malicious website to make network connections, through Java APIs, to network services on machines other than the one that the JavaScript code was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited. (CVE-2007-5274)\n\n - A second vulnerability in the JRE may allow an untrusted applet that is downloaded from a malicious website through a web proxy to make network connections to network services on machines other than the one that the applet was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited.\n (CVE-2007-5273)\n\n - An untrusted Java Web Start application may write arbitrary files with the privileges of the user running the application. (CVE-2007-5236)\n\n - Three separate vulnerabilities may allow an untrusted Java Web Start application to determine the location of the Java Web Start cache. (CVE-2007-5238)\n\n - An untrusted Java Web Start application or Java applet may move or copy arbitrary files by requesting the user of the application or applet to drag and drop a file from the Java Web Start application or Java applet window. (CVE-2007-5239)\n\n - An untrusted applet may display an over-sized window so that the applet warning banner is not visible to the user running the untrusted applet. CVE-2007-4381: A vulnerability in the font parsing code in the Java Runtime Environment may allow an untrusted applet to elevate its privileges. For example, an applet may grant itself permissions to read and write local files or execute local applications that are accessible to the user running the untrusted applet. (CVE-2007-5240)\n\n - The Java Secure Socket Extension (JSSE) that is included in various releases of the Java Runtime Environment does not correctly process SSL/TLS handshake requests. This vulnerability may be exploited to create a Denial of Service (DoS) condition to the system as a whole on a server that listens for SSL/TLS connections using JSSE for SSL/TLS support. (CVE-2007-3698)\n\nFor more information see:\nhttp://www-128.ibm.com/developerworks/java/jdk/alerts/\n\nAdditionally a concurrency bug has been fixed (Novell Bug 330713).", "published": "2007-12-13T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=29476", "cvelist": ["CVE-2007-3698", "CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-4381", "CVE-2007-5274"], "lastseen": "2017-10-29T13:38:23"}, {"id": "SUN_JAVA_JRE_103079_UNIX.NASL", "type": "nessus", "title": "Sun Java JRE / Web Start Multiple Vulnerabilities (103072, 103073, 103078, 103079, 103112) (Unix)", "description": "According to its version number, the Sun Java Runtime Environment (JRE) and/or Web Start installed on the remote host is reportedly affected by several issues that could be abused to move / copy local files, read or write local files, circumvent network access restrictions, or elevate privileges.", "published": "2013-02-22T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=64824", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5689", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-10-29T13:41:38"}, {"id": "SUSE_JAVA-1_4_2-SUN-4533.NASL", "type": "nessus", "title": "SuSE 10 Security Update : Sun Java 1.4.2 (ZYPP Patch Number 4533)", "description": "The Sun JAVA JDK 1.4.2 was upgraded to release 16 to fix various bugs, including the following security bugs :\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103079-1\n\n - Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack. (CVE-2007-5232)\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103073-1\n\n - Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enfor ce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted applica tion. (CVE-2007-5236)\n\n - Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka 'two vulnerabilities'.\n (CVE-2007-5237)\n\n - Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka 'three vulnerabilities.'. (CVE-2007-5238)\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103072-1\n\n - Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.\n (CVE-2007-5239)\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103071-1\n\n - Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen. (CVE-2007-5240)\n\nhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103078-1\n\n - Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. (CVE-2007-5273)\n\n - Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273. (CVE-2007-5274)", "published": "2007-12-13T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=29473", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-10-29T13:36:09"}, {"id": "REDHAT-RHSA-2007-0963.NASL", "type": "nessus", "title": "RHEL 4 / 5 : java-1.5.0-sun (RHSA-2007:0963)", "description": "Updated java-1.5.0-sun packages that correct several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nThe Java Runtime Environment (JRE) contains the software and tools that users need to run applets and applications written using the Java programming language.\n\nA flaw in the applet caching mechanism of the Java Runtime Environment (JRE) did not correctly process the creation of network connections. A remote attacker could use this flaw to create connections to services on machines other than the one that the applet was downloaded from.\n(CVE-2007-5232)\n\nMultiple vulnerabilities existed in Java Web Start allowing an untrusted application to determine the location of the Java Web Start cache. (CVE-2007-5238)\n\nUntrusted Java Web Start Applications or Java Applets were able to drag and drop a file to a Desktop Application. A user-assisted remote attacker could use this flaw to move or copy arbitrary files.\n(CVE-2007-5239)\n\nThe Java Runtime Environment (JRE) allowed untrusted Java Applets or applications to display oversized Windows. This could be used by remote attackers to hide security warning banners. (CVE-2007-5240)\n\nUnsigned Java Applets communicating via a HTTP proxy could allow a remote attacker to violate the Java security model. A cached, malicious Applet could create network connections to services on other machines. (CVE-2007-5273)\n\nUnsigned Applets loaded with Mozilla Firefox or Opera browsers allowed remote attackers to violate the Java security model. A cached, malicious Applet could create network connections to services on other machines. (CVE-2007-5274)\n\nIn Red Hat Enterprise Linux a Java Web Start application requesting elevated permissions is only started automatically when signed with a trusted code signing certificate and otherwise requires user confirmation to access privileged resources.\n\nAll users of java-sun-1.5.0 should upgrade to these packages, which contain Sun Java 1.5.0 Update 13 that corrects these issues.\n\nPlease note that during our quality testing we discovered that the Java browser plug-in may not function perfectly when visiting some sites that make use of multiple applets on a single HTML page. We have verified that this issue is not due to our packaging and affects Sun Java 1.5.0 Update 13.", "published": "2009-08-24T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=40709", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5273", "CVE-2007-5689", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-10-29T13:36:56"}, {"id": "SUN_JAVA_JRE_103079.NASL", "type": "nessus", "title": "Sun Java JRE / Web Start Multiple Vulnerabilities (103072, 103073, 103078, 103079, 103112)", "description": "According to its version number, the Sun Java Runtime Environment (JRE) and/or Web Start installed on the remote host reportedly is affected by several issues that could be abused to move / copy local files, read or write local files, circumvent network access restrictions, or elevate privileges.", "published": "2007-10-05T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=26923", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5689", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-10-29T13:37:23"}, {"id": "SL_20071128_JDK__JAVA__ON_SL5_X.NASL", "type": "nessus", "title": "Scientific Linux Security Update : jdk (java) on SL5.x i386/x86_64", "description": "A flaw in the applet caching mechanism of the Java Runtime Environment (JRE) did not correctly process the creation of network connections. A remote attacker could use this flaw to create connections to services on machines other than the one that the applet was downloaded from.\n(CVE-2007-5232)\n\nMultiple vulnerabilities existed in Java Web Start allowing an untrusted application to determine the location of the Java Web Start cache. (CVE-2007-5238)\n\nUntrusted Java Web Start Applications or Java Applets were able to drag and drop a file to a Desktop Application. A user-assisted remote attacker could use this flaw to move or copy arbitrary files.\n(CVE-2007-5239)\n\nThe Java Runtime Environment (JRE) allowed untrusted Java Applets or applications to display oversized Windows. This could be used by remote attackers to hide security warning banners. (CVE-2007-5240)\n\nUnsigned Java Applets communicating via a HTTP proxy could allow a remote attacker to violate the Java security model. A cached, malicious Applet could create network connections to services on other machines. (CVE-2007-5273)\n\nUnsigned Applets loaded with Mozilla Firefox or Opera browsers allowed remote attackers to violate the Java security model. A cached, malicious Applet could create network connections to services on other machines. (CVE-2007-5274) The Javadoc tool was able to generate HTML documentation pages that contained cross-site scripting (XSS) vulnerabilities. A remote attacker could use this to inject arbitrary web script or HTML. (CVE-2007-3503)\n\nThe Java Web Start URL parsing component contained a buffer overflow vulnerability within the parsing code for JNLP files. A remote attacker could create a malicious JNLP file that could trigger this flaw and execute arbitrary code when opened. (CVE-2007-3655)\n\nThe JSSE component did not correctly process SSL/TLS handshake requests. A remote attacker who is able to connect to a JSSE-based service could trigger this flaw leading to a denial-of-service.\n(CVE-2007-3698)\n\nA flaw was found in the applet class loader. An untrusted applet could use this flaw to circumvent network access restrictions, possibly connecting to services hosted on the machine that executed the applet.\n(CVE-2007-3922)\n\nNOTE: These packages have been tested to not remove newer jdks (such as 1.6 or 1.7)", "published": "2012-08-01T00:00:00", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=60316", "cvelist": ["CVE-2007-3698", "CVE-2007-5238", "CVE-2007-3503", "CVE-2007-5232", "CVE-2007-3655", "CVE-2007-5240", "CVE-2007-3922", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-10-29T13:40:25"}, {"id": "SL_20080114_JDK__JAVA__ON_SL3_X.NASL", "type": "nessus", "title": "Scientific Linux Security Update : jdk (java) on SL3.x, SL4.x i386/x86_64", "description": "NOTE: This combination of rpm's replaces j2sdk-1.4.2 with jdk-1.5.0.\nSo your java will change from version 1.4.2 to 1.5.0. We apologize if this causes any problems, but it needed to be done for security reasons.\n\nA flaw in the applet caching mechanism of the Java Runtime Environment (JRE) did not correctly process the creation of network connections. A remote attacker could use this flaw to create connections to services on machines other than the one that the applet was downloaded from.\n(CVE-2007-5232)\n\nMultiple vulnerabilities existed in Java Web Start allowing an untrusted application to determine the location of the Java Web Start cache. (CVE-2007-5238)\n\nUntrusted Java Web Start Applications or Java Applets were able to drag and drop a file to a Desktop Application. A user-assisted remote attacker could use this flaw to move or copy arbitrary files.\n(CVE-2007-5239)\n\nThe Java Runtime Environment (JRE) allowed untrusted Java Applets or applications to display oversized Windows. This could be used by remote attackers to hide security warning banners. (CVE-2007-5240)\n\nUnsigned Java Applets communicating via a HTTP proxy could allow a remote attacker to violate the Java security model. A cached, malicious Applet could create network connections to services on other machines. (CVE-2007-5273)\n\nUnsigned Applets loaded with Mozilla Firefox or Opera browsers allowed remote attackers to violate the Java security model. A cached, malicious Applet could create network connections to services on other machines. (CVE-2007-5274) The Javadoc tool was able to generate HTML documentation pages that contained cross-site scripting (XSS) vulnerabilities. A remote attacker could use this to inject arbitrary web script or HTML. (CVE-2007-3503)\n\nThe Java Web Start URL parsing component contained a buffer overflow vulnerability within the parsing code for JNLP files. A remote attacker could create a malicious JNLP file that could trigger this flaw and execute arbitrary code when opened. (CVE-2007-3655)\n\nThe JSSE component did not correctly process SSL/TLS handshake requests. A remote attacker who is able to connect to a JSSE-based service could trigger this flaw leading to a denial-of-service.\n(CVE-2007-3698)\n\nA flaw was found in the applet class loader. An untrusted applet could use this flaw to circumvent network access restrictions, possibly connecting to services hosted on the machine that executed the applet.\n(CVE-2007-3922)", "published": "2012-08-01T00:00:00", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=60344", "cvelist": ["CVE-2007-3698", "CVE-2007-5238", "CVE-2007-3503", "CVE-2007-5232", "CVE-2007-3655", "CVE-2007-5240", "CVE-2007-3922", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-10-29T13:36:56"}], "redhat": [{"id": "RHSA-2007:1041", "type": "redhat", "title": "(RHSA-2007:1041) Important: java-1.5.0-ibm security update", "description": "IBM's 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\r\nthe IBM Java 2 Software Development Kit.\r\n\r\nThe applet caching mechanism of the Java Runtime Environment (JRE) did not\r\ncorrectly process the creation of network connections. A remote attacker\r\ncould use this flaw to create connections to services on machines other\r\nthan the one that the applet was downloaded from. (CVE-2007-5232)\r\n\r\nMultiple vulnerabilities existed in Java Web Start allowing an untrusted\r\napplication to determine the location of the Java Web Start cache.\r\n(CVE-2007-5238)\r\n\r\nUntrusted Java Web Start Applications or Java Applets were able to drag and\r\ndrop a file to a Desktop Application. A user-assisted remote attacker could\r\nuse this flaw to move or copy arbitrary files. (CVE-2007-5239)\r\n\r\nThe Java Runtime Environment allowed untrusted Java Applets or applications\r\nto display oversized Windows. This could be used by remote attackers to\r\nhide security warning banners. (CVE-2007-5240)\r\n\r\nUnsigned Java Applets communicating via a HTTP proxy could allow a remote\r\nattacker to violate the Java security model. A cached malicious Applet\r\ncould create network connections to services on other machines.\r\n(CVE-2007-5273)\r\n\r\nUnsigned Applets loaded with Mozilla Firefox or Opera browsers allowed\r\nremote attackers to violate the Java security model. A cached malicious\r\nApplet could create network connections to services on other machines.\r\n(CVE-2007-5274) \r\n\r\nAll users of java-ibm-1.5.0 are advised to upgrade to these updated\r\npackages, that contain IBM's 1.5.0 SR6 Java release which resolves these\r\nissues.", "published": "2007-11-26T05:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://access.redhat.com/errata/RHSA-2007:1041", "cvelist": ["CVE-2007-5232", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-5273", "CVE-2007-5274"], "lastseen": "2017-09-09T07:19:58"}, {"id": "RHSA-2007:0963", "type": "redhat", "title": "(RHSA-2007:0963) Important: java-1.5.0-sun security update", "description": "The Java Runtime Environment (JRE) contains the software and tools\r\nthat users need to run applets and applications written using the Java\r\nprogramming language.\r\n\r\nA flaw in the applet caching mechanism of the Java Runtime Environment\r\n(JRE) did not correctly process the creation of network connections. A\r\nremote attacker could use this flaw to create connections to\r\nservices on machines other than the one that the applet was downloaded\r\nfrom. (CVE-2007-5232) \r\n\r\nMultiple vulnerabilities existed in Java Web Start allowing an untrusted\r\napplication to determine the location of the Java Web Start cache.\r\n(CVE-2007-5238)\r\n\r\nUntrusted Java Web Start Applications or Java Applets were able to drag and\r\ndrop a file to a Desktop Application. A user-assisted remote attacker could\r\nuse this flaw to move or copy arbitrary files. (CVE-2007-5239)\r\n\r\nThe Java Runtime Environment (JRE) allowed untrusted Java Applets or\r\napplications to display oversized Windows. This could be used by remote\r\nattackers to hide security warning banners. (CVE-2007-5240)\r\n\r\nUnsigned Java Applets communicating via a HTTP proxy could allow a remote\r\nattacker to violate the Java security model. A cached, malicious Applet \r\ncould create network connections to services on other machines. \r\n(CVE-2007-5273)\r\n\r\nUnsigned Applets loaded with Mozilla Firefox or Opera browsers allowed\r\nremote attackers to violate the Java security model. A cached, malicious \r\nApplet could create network connections to services on other machines. \r\n(CVE-2007-5274)\r\n\r\nIn Red Hat Enterprise Linux a Java Web Start application requesting\r\nelevated permissions is only started automatically when signed with a\r\ntrusted code signing certificate and otherwise requires user confirmation\r\nto access privileged resources. \r\n\r\nAll users of java-sun-1.5.0 should upgrade to these packages, which contain\r\nSun Java 1.5.0 Update 13 that corrects these issues.\r\n\r\nPlease note that during our quality testing we discovered that the Java\r\nbrowser plug-in may not function perfectly when visiting some sites that\r\nmake use of multiple applets on a single HTML page. We have verified that\r\nthis issue is not due to our packaging and affects Sun Java 1.5.0 Update 13.", "published": "2007-10-12T04:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2007:0963", "cvelist": ["CVE-2007-5232", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-5273", "CVE-2007-5274", "CVE-2007-5689"], "lastseen": "2017-07-28T08:57:23"}, {"id": "RHSA-2008:0132", "type": "redhat", "title": "(RHSA-2008:0132) Critical: java-1.4.2-ibm security update", "description": "IBM's 1.4.2 SR10 Java release includes the IBM Java 2 Runtime Environment\r\nand the IBM Java 2 Software Development Kit.\r\n\r\nThe Java Secure Socket Extension (JSSE) component did not correctly process\r\nSSL/TLS handshake requests. A remote attacker who is able to connect to a\r\nJSSE-based service could trigger this flaw leading to a denial-of-service.\r\n(CVE-2007-3698) \r\n\r\nA flaw was found in the way the Java Runtime Environment processes font\r\ndata. An untrusted applet could elevate its privileges, allowing the applet\r\nto perform actions with the same permissions as the logged in user. It may\r\nalso be possible to crash a server application which processes untrusted\r\nfont information from a third party. (CVE-2007-4381) \r\n\r\nThe applet caching mechanism of the Java Runtime Environment (JRE) did not\r\ncorrectly process the creation of network connections. A remote attacker\r\ncould use this flaw to create connections to services on machines other\r\nthan the one that the applet was downloaded from. (CVE-2007-5232)\r\n\r\nMultiple vulnerabilities existed in Java Web Start allowing an untrusted\r\napplication to determine the location of the Java Web Start cache.\r\n(CVE-2007-5238)\r\n\r\nUntrusted Java Web Start Applications or Java Applets were able to drag and\r\ndrop a file to a Desktop Application. A user-assisted remote attacker could\r\nuse this flaw to move or copy arbitrary files. (CVE-2007-5239)\r\n\r\nThe Java Runtime Environment allowed untrusted Java Applets or applications\r\nto display oversized Windows. This could be used by remote attackers to\r\nhide security warning banners. (CVE-2007-5240)\r\n\r\nUnsigned Java Applets communicating via a HTTP proxy could allow a remote\r\nattacker to violate the Java security model. A cached malicious Applet\r\ncould create network connections to services on other machines.\r\n(CVE-2007-5273)\r\n\r\nUnsigned Applets loaded with Mozilla Firefox or Opera browsers allowed\r\nremote attackers to violate the Java security model. A cached malicious\r\nApplet could create network connections to services on other machines.\r\n(CVE-2007-5274)\r\n\r\nAll users of java-1.4.2-ibm are advised to upgrade to these updated\r\npackages, that contain IBM's 1.4.2 SR10 Java release which resolves these\r\nissues.", "published": "2008-02-14T05:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2008:0132", "cvelist": ["CVE-2007-3698", "CVE-2007-4381", "CVE-2007-5232", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-5273", "CVE-2007-5274", "CVE-2008-1189", "CVE-2008-1190", "CVE-2008-1192", "CVE-2008-1195"], "lastseen": "2017-09-09T07:20:36"}, {"id": "RHSA-2008:0156", "type": "redhat", "title": "(RHSA-2008:0156) Moderate: java-1.5.0-bea security update", "description": "The BEA WebLogic JRockit 1.5.0_14 JRE and SDK contain BEA WebLogic JRockit\r\nVirtual Machine 1.5.0_14 and are certified for the Java 5 Platform,\r\nStandard Edition, v1.5.0.\r\n\r\nA flaw in the applet caching mechanism of the Java Runtime Environment\r\n(JRE) did not correctly process the creation of network connections. A\r\nremote attacker could use this flaw to create connections to services on\r\nmachines other than the one that the applet was downloaded from.\r\n(CVE-2007-5232)\r\n\r\nUntrusted Java Applets were able to drag and drop a file to a Desktop\r\nApplication. A user-assisted remote attacker could use this flaw to move or\r\ncopy arbitrary files. (CVE-2007-5239)\r\n\r\nThe Java Runtime Environment (JRE) allowed untrusted Java Applets or\r\napplications to display oversized windows. This could be used by remote\r\nattackers to hide security warning banners. (CVE-2007-5240)\r\n\r\nUnsigned Java Applets communicating via a HTTP proxy could allow a remote\r\nattacker to violate the Java security model. A cached, malicious Applet\r\ncould create network connections to services on other machines. (CVE-2007-5273)\r\n\r\nTwo vulnerabilities in the Java Runtime Environment allowed an untrusted\r\napplication or applet to elevate the assigned privileges. This could be\r\nmisused by a malicious website to read and write local files or execute\r\nlocal applications in the context of the user running the Java process.\r\n(CVE-2008-0657)\r\n\r\nThose vulnerabilities concerned with applets can only be triggered in\r\njava-1.5.0-bea by calling the 'appletviewer' application. \r\n\r\nAll users of java-1.5.0-bea should upgrade to these updated packages, which\r\ncontain the BEA WebLogic JRockit 1.5.0_14 release that resolves these issues.", "published": "2008-03-05T05:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2008:0156", "cvelist": ["CVE-2007-5232", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-5273", "CVE-2008-0657"], "lastseen": "2017-09-09T07:20:30"}, {"id": "RHSA-2008:0100", "type": "redhat", "title": "(RHSA-2008:0100) Moderate: java-1.4.2-bea security update", "description": "The BEA WebLogic JRockit 1.4.2_16 JRE and SDK contains BEA WebLogic JRockit\r\nVirtual Machine 1.4.2_16 and is certified for the Java 2 Platform, Standard\r\nEdition, v1.4.2.\r\n\r\nA buffer overflow in the Java Runtime Environment image handling code was\r\nfound. If an attacker could induce a server application to process a\r\nspecially crafted image file, the attacker could potentially cause a\r\ndenial-of-service or execute arbitrary code as the user running the Java\r\nVirtual Machine. (CVE-2007-2788, CVE-2007-2789)\r\n\r\nA denial of service flaw was found in the way the JSSE component processed\r\nSSL/TLS handshake requests. A remote attacker able to connect to a JSSE\r\nenabled service could send a specially crafted handshake which would cause\r\nthe Java Runtime Environment to stop responding to future requests.\r\n(CVE-2007-3698)\r\n\r\nA flaw was found in the way the Java Runtime Environment processed font\r\ndata. An applet viewed via the \"appletviewer\" application could elevate its\r\nprivileges, allowing the applet to perform actions with the same\r\npermissions as the user running the \"appletviewer\" application. The same\r\nflaw could, potentially, crash a server application which processed\r\nuntrusted font information from a third party. (CVE-2007-4381)\r\n\r\nA flaw in the applet caching mechanism of the Java Runtime Environment\r\n(JRE) did not correctly process the creation of network connections. A\r\nremote attacker could use this flaw to create connections to services on\r\nmachines other than the one that the applet was downloaded from.\r\n(CVE-2007-5232)\r\n\r\nUntrusted Java Applets were able to drag and drop files to a desktop\r\napplication. A user-assisted remote attacker could use this flaw to move or\r\ncopy arbitrary files. (CVE-2007-5239)\r\n\r\nThe Java Runtime Environment (JRE) allowed untrusted Java Applets or\r\napplications to display over-sized windows. This could be used by remote\r\nattackers to hide security warning banners. (CVE-2007-5240)\r\n\r\nUnsigned Java Applets communicating via a HTTP proxy could allow a remote\r\nattacker to violate the Java security model. A cached, malicious Applet\r\ncould create network connections to services on other machines.\r\n(CVE-2007-5273)\r\n\r\nPlease note: the vulnerabilities noted above concerned with applets can\r\nonly be triggered in java-1.4.2-bea by calling the \"appletviewer\"\r\napplication.\r\n\r\nAll users of java-1.4.2-bea should upgrade to these updated packages, which\r\ncontain the BEA WebLogic JRockit 1.4.2_16 release which resolves these\r\nissues.", "published": "2008-03-11T04:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2008:0100", "cvelist": ["CVE-2007-2788", "CVE-2007-2789", "CVE-2007-3698", "CVE-2007-4381", "CVE-2007-5232", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-5273"], "lastseen": "2017-09-08T08:04:23"}], "openvas": [{"id": "OPENVAS:850067", "type": "openvas", "title": "SuSE Update for Sun Java SUSE-SA:2007:055", "description": "Check for the Version of Sun Java", "published": "2009-01-28T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=850067", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-12-12T11:21:03"}, {"id": "OPENVAS:136141256231065313", "type": "openvas", "title": "SLES9: Security update for IBMJava5-JRE,IBMJava5-SDK", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n IBMJava5-JRE\n IBMJava5-SDK\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5021818 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "published": "2009-10-10T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065313", "cvelist": ["CVE-2007-3698", "CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-4381", "CVE-2007-5274"], "lastseen": "2018-04-06T11:37:54"}, {"id": "OPENVAS:136141256231065091", "type": "openvas", "title": "SLES9: Security update for Sun Java 2", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n java2\n java2-jre\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5020427 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "published": "2009-10-10T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065091", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2018-04-06T11:38:10"}, {"id": "OPENVAS:835094", "type": "openvas", "title": "HP-UX Update for Java JRE and JDK HPSBUX02284", "description": "Check for the Version of Java JRE and JDK", "published": "2009-05-05T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=835094", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5689", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-07-24T12:57:00"}, {"id": "OPENVAS:65091", "type": "openvas", "title": "SLES9: Security update for Sun Java 2", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n java2\n java2-jre\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5020427 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "published": "2009-10-10T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=65091", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2017-07-26T08:55:31"}, {"id": "OPENVAS:65313", "type": "openvas", "title": "SLES9: Security update for IBMJava5-JRE,IBMJava5-SDK", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n IBMJava5-JRE\n IBMJava5-SDK\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5021818 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "published": "2009-10-10T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=65313", "cvelist": ["CVE-2007-3698", "CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-4381", "CVE-2007-5274"], "lastseen": "2017-07-26T08:55:25"}, {"id": "OPENVAS:1361412562310835094", "type": "openvas", "title": "HP-UX Update for Java JRE and JDK HPSBUX02284", "description": "Check for the Version of Java JRE and JDK", "published": "2009-05-05T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310835094", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5689", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2018-04-09T11:41:08"}, {"id": "OPENVAS:850026", "type": "openvas", "title": "SuSE Update for IBMJava2,IBMJava5,java-1_4_2-ibm,java-1_5_0-ibm SUSE-SA:2008:025", "description": "Check for the Version of IBMJava2,IBMJava5,java-1_4_2-ibm,java-1_5_0-ibm", "published": "2009-01-23T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=850026", "cvelist": ["CVE-2007-3698", "CVE-2008-1195", "CVE-2008-1194", "CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2008-1189", "CVE-2008-0657", "CVE-2008-1196", "CVE-2007-5236", "CVE-2008-1190", "CVE-2007-5273", "CVE-2008-1187", "CVE-2008-1188", "CVE-2007-5239", "CVE-2007-4381", "CVE-2007-5274", "CVE-2008-1193", "CVE-2008-1192"], "lastseen": "2017-12-12T11:21:13"}, {"id": "OPENVAS:66000", "type": "openvas", "title": "SLES10: Security update for IBM Java 1.5.0", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n java-1_5_0-ibm\n java-1_5_0-ibm-alsa\n java-1_5_0-ibm-devel\n java-1_5_0-ibm-fonts\n java-1_5_0-ibm-jdbc\n java-1_5_0-ibm-plugin\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "published": "2009-10-13T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=66000", "cvelist": ["CVE-2008-1195", "CVE-2008-1194", "CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2008-1189", "CVE-2008-0657", "CVE-2008-1196", "CVE-2007-5236", "CVE-2008-1190", "CVE-2007-5273", "CVE-2008-1187", "CVE-2008-1188", "CVE-2007-5239", "CVE-2007-4381", "CVE-2007-5274", "CVE-2008-1193", "CVE-2008-1192"], "lastseen": "2017-07-26T08:56:10"}, {"id": "OPENVAS:65053", "type": "openvas", "title": "SLES9: Security update for IBM Java 2 JRE and SDK", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n IBMJava2-SDK\n IBMJava2-JRE\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5023603 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "published": "2009-10-10T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=65053", "cvelist": ["CVE-2007-3698", "CVE-2008-1195", "CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2008-1189", "CVE-2008-1196", "CVE-2007-5236", "CVE-2008-1190", "CVE-2007-5273", "CVE-2008-1187", "CVE-2007-5239", "CVE-2007-4381", "CVE-2007-5274", "CVE-2008-1192"], "lastseen": "2017-07-26T08:55:28"}], "suse": [{"id": "SUSE-SA:2007:055", "type": "suse", "title": "remote code execution in Sun Java", "description": "The Sun JAVA JDK 1.5.0 was upgraded to release 13, and the Sun JAVA SDK 1.4.2 was upgraded to update 16 to fix various bugs, including the following security bugs:\n#### Solution\nThere is no known workaround, please install the update packages.", "published": "2007-10-17T16:49:13", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00004.html", "cvelist": ["CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2007-5237", "CVE-2007-5236", "CVE-2007-5273", "CVE-2007-5239", "CVE-2007-5274"], "lastseen": "2016-09-04T11:29:37"}, {"id": "SUSE-SA:2008:025", "type": "suse", "title": "remote code execution in IBMJava2,IBMJava5,java-1_4_2-ibm,java-1_5_0-ibm", "description": "IBM Java 1.4.2 was updated to SR10 and IBM Java 1.5.0 was updated to SR7 to fix various security issues:\n#### Solution\nThere is no known workaround, please install the update packages.", "published": "2008-04-25T14:46:33", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html", "cvelist": ["CVE-2007-3698", "CVE-2008-1195", "CVE-2008-1194", "CVE-2007-5238", "CVE-2007-5232", "CVE-2007-5240", "CVE-2008-1189", "CVE-2008-0657", "CVE-2008-1196", "CVE-2007-5236", "CVE-2008-1190", "CVE-2007-5273", "CVE-2008-1187", "CVE-2008-1188", "CVE-2007-5239", "CVE-2007-4381", "CVE-2007-5274", "CVE-2008-1193", "CVE-2008-1192"], "lastseen": "2016-09-04T11:31:33"}], "gentoo": [{"id": "GLSA-200804-20", "type": "gentoo", "title": "Sun JDK/JRE: Multiple vulnerabilities", "description": "### Background\n\nThe Sun Java Development Kit (JDK) and the Sun Java Runtime Environment (JRE) provide the Sun Java platform. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Sun Java: \n\n * Daniel Soeder discovered that a long codebase attribute string in a JNLP file will overflow a stack variable when launched by Java WebStart (CVE-2007-3655).\n * Multiple vulnerabilities (CVE-2007-2435, CVE-2007-2788, CVE-2007-2789) that were previously reported as GLSA 200705-23 and GLSA 200706-08 also affect 1.4 and 1.6 SLOTs, which was not mentioned in the initial revision of said GLSAs.\n * The Zero Day Initiative, TippingPoint and John Heasman reported multiple buffer overflows and unspecified vulnerabilities in Java Web Start (CVE-2008-1188, CVE-2008-1189, CVE-2008-1190, CVE-2008-1191).\n * Hisashi Kojima of Fujitsu and JPCERT/CC reported a security issue when performing XSLT transformations (CVE-2008-1187).\n * CERT/CC reported a Stack-based buffer overflow in Java Web Start when using JNLP files (CVE-2008-1196).\n * Azul Systems reported an unspecified vulnerability that allows applets to escalate their privileges (CVE-2007-5689).\n * Billy Rios, Dan Boneh, Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, and David Byrne discovered multiple instances where Java applets or JavaScript programs run within browsers do not pin DNS hostnames to a single IP address, allowing for DNS rebinding attacks (CVE-2007-5232, CVE-2007-5273, CVE-2007-5274).\n * Peter Csepely reported that Java Web Start does not properly enforce access restrictions for untrusted applications (CVE-2007-5237, CVE-2007-5238).\n * Java Web Start does not properly enforce access restrictions for untrusted Java applications and applets, when handling drag-and-drop operations (CVE-2007-5239).\n * Giorgio Maone discovered that warnings for untrusted code can be hidden under applications' windows (CVE-2007-5240).\n * Fujitsu reported two security issues where security restrictions of web applets and applications were not properly enforced (CVE-2008-1185, CVE-2008-1186).\n * John Heasman of NGSSoftware discovered that the Java Plug-in does not properly enforce the same origin policy (CVE-2008-1192).\n * Chris Evans of the Google Security Team discovered multiple unspecified vulnerabilities within the Java Runtime Environment Image Parsing Library (CVE-2008-1193, CVE-2008-1194).\n * Gregory Fleischer reported that web content fetched via the \"jar:\" protocol was not subject to network access restrictions (CVE-2008-1195).\n * Chris Evans and Johannes Henkel of the Google Security Team reported that the XML parsing code retrieves external entities even when that feature is disabled (CVE-2008-0628).\n * Multiple unspecified vulnerabilities might allow for escalation of privileges (CVE-2008-0657).\n\n### Impact\n\nA remote attacker could entice a user to run a specially crafted applet on a website or start an application in Java Web Start to execute arbitrary code outside of the Java sandbox and of the Java security restrictions with the privileges of the user running Java. The attacker could also obtain sensitive information, create, modify, rename and read local files, execute local applications, establish connections in the local network, bypass the same origin policy, and cause a Denial of Service via multiple vectors. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Sun JRE 1.6 users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-java/sun-jre-bin-1.6.0.05\"\n\nAll Sun JRE 1.5 users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-java/sun-jre-bin-1.5.0.15\"\n\nAll Sun JRE 1.4 users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-java/sun-jre-bin-1.4.2.17\"\n\nAll Sun JDK 1.6 users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-java/sun-jdk-1.6.0.05\"\n\nAll Sun JDK 1.5 users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-java/sun-jdk-1.5.0.15\"\n\nAll Sun JDK 1.4 users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-java/sun-jdk-1.4.2.17\"\n\nAll emul-linux-x86-java 1.6 users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/emul-linux-x86-java-1.6.0.05\"\n\nAll emul-linux-x86-java 1.5 users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/emul-linux-x86-java-1.5.0.15\"\n\nAll emul-linux-x86-java 1.4 users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/emul-linux-x86-java-1.4.2.17\"", "published": "2008-04-17T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://security.gentoo.org/glsa/200804-20", "cvelist": ["CVE-2008-1195", "CVE-2008-1194", "CVE-2007-5238", "CVE-2008-1191", "CVE-2008-0628", "CVE-2007-5232", "CVE-2007-3655", "CVE-2007-5240", "CVE-2008-1189", "CVE-2007-2788", "CVE-2008-1186", "CVE-2008-0657", "CVE-2008-1185", "CVE-2007-5237", "CVE-2008-1196", "CVE-2007-2789", "CVE-2007-2435", "CVE-2008-1190", "CVE-2007-5273", "CVE-2008-1187", "CVE-2007-5689", "CVE-2008-1188", "CVE-2007-5239", "CVE-2007-5274", "CVE-2008-1193", "CVE-2008-1192"], "lastseen": "2016-09-06T19:46:21"}], "vmware": [{"id": "VMSA-2008-0010", "type": "vmware", "title": "Updated Tomcat and Java JRE packages for VMware ESX 3.5 and VirtualCenter", "description": " \nESX patches and updates for VirtualCenter fix the following \napplication vulnerabilities.\n", "published": "2008-06-16T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.vmware.com/security/advisories/VMSA-2008-0010.html", "cvelist": ["CVE-2007-5342", "CVE-2008-1195", "CVE-2008-1194", "CVE-2007-5238", "CVE-2008-1191", "CVE-2007-5333", "CVE-2007-5232", "CVE-2007-5240", "CVE-2008-1189", "CVE-2008-1186", "CVE-2008-0657", "CVE-2008-1185", "CVE-2007-5237", "CVE-2008-1196", "CVE-2007-5461", "CVE-2007-5236", "CVE-2007-6286", "CVE-2008-1190", "CVE-2008-1187", "CVE-2007-5689", "CVE-2008-1188", "CVE-2007-5239", "CVE-2007-5274", "CVE-2008-1193", "CVE-2008-1192"], "lastseen": "2016-09-04T11:19:37"}], "freebsd": [{"id": "C93E4D41-75C5-11DC-B903-0016179B2DD5", "type": "freebsd", "title": "jdk/jre -- Applet Caching May Allow Network Access Restrictions to be Circumvented", "description": "\nSUN reports:\n\nA vulnerability in the Java Runtime Environment (JRE) with applet\n\t caching may allow an untrusted applet that is downloaded from a\n\t malicious website to make network connections to network services\n\t on machines other than the one that the applet was downloaded from.\n\t This may allow network resources (such as web pages) and\n\t vulnerabilities (that exist on these network services) which are not\n\t otherwise normally accessible to be accessed or exploited.\n\n", "published": "2007-10-03T00:00:00", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "href": "https://vuxml.freebsd.org/freebsd/c93e4d41-75c5-11dc-b903-0016179b2dd5.html", "cvelist": ["CVE-2007-5232"], "lastseen": "2016-09-26T17:25:00"}], "f5": [{"id": "F5:K16475", "type": "f5", "title": "Multiple Sun Java vulnerabilities", "description": "\nF5 Product Development has evaluated the currently supported releases for potential vulnerability.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| None| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nBIG-IP AAM| None| 11.4.0 - 11.6.0| Not vulnerable| None \nBIG-IP AFM| None| 11.3.0 - 11.6.0| Not vulnerable| None \nBIG-IP Analytics| None| 11.0.0 - 11.6.0| Not vulnerable| None \nBIG-IP APM| None| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nBIG-IP ASM| None| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nBIG-IP Edge Gateway| None| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nBIG-IP GTM| None| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nBIG-IP Link Controller| None| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nBIG-IP PEM| None| 11.3.0 - 11.6.0| Not vulnerable| None \nBIG-IP PSM| None| 11.0.0 - 11.4.1 \n10.1.0 - 10.2.4| Not vulnerable| None \nBIG-IP WebAccelerator| None| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nBIG-IP WOM| None| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nARX| None| 6.0.0 - 6.4.0| Not vulnerable| None \nEnterprise Manager| None| 3.0.0 - 3.1.1| Not vulnerable| None \nFirePass| None| 7.0.0 \n6.0.0 - 6.1.0| Not vulnerable| None \nBIG-IQ Cloud| None| 4.0.0 - 4.5.0| Not vulnerable| None \nBIG-IQ Device| None| 4.2.0 - 4.5.0| Not vulnerable| None \nBIG-IQ Security| None| 4.0.0 - 4.5.0| Not vulnerable| None \nBIG-IQ ADC| None| 4.5.0| Not vulnerable| None \nLineRate| None| 2.2.0 - 2.5.0 \n1.6.0 - 1.6.4| Not vulnerable| None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| None| 4.0.0 - 4.1.0 \n3.3.2 - 3.5.1| Not vulnerable| None \n \n**Note**: As of February 17, 2015, AskF5 Security Advisory articles include the **Severity** value. Security Advisory articles published before this date do not list a **Severity** value.\n\nNone\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n", "published": "2015-04-21T21:01:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://support.f5.com/csp/article/K16475", "cvelist": ["CVE-2008-3105", "CVE-2008-1195", "CVE-2007-3715", "CVE-2008-1191", "CVE-2007-3655", "CVE-2008-1189", "CVE-2008-1186", "CVE-2008-1185", "CVE-2008-3110", "CVE-2008-3109", "CVE-2007-3922", "CVE-2008-1190", "CVE-2008-1187", "CVE-2007-5689", "CVE-2008-1188", "CVE-2007-3716", "CVE-2007-5239"], "lastseen": "2017-06-08T00:16:33"}, {"id": "SOL16475", "type": "f5", "title": "SOL16475 - Multiple Sun Java vulnerabilities", "description": "Vulnerability Recommended Actions\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4602: Overview of the F5 security vulnerability response policy\n", "published": "2015-04-21T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://support.f5.com/kb/en-us/solutions/public/16000/400/sol16475.html", "cvelist": ["CVE-2008-3105", "CVE-2008-1195", "CVE-2007-3715", "CVE-2008-1191", "CVE-2007-3655", "CVE-2008-1189", "CVE-2008-1186", "CVE-2008-1185", "CVE-2008-3110", "CVE-2008-3109", "CVE-2007-3922", "CVE-2008-1190", "CVE-2008-1187", "CVE-2007-5689", "CVE-2008-1188", "CVE-2007-3716", "CVE-2007-5239"], "lastseen": "2016-11-09T00:09:31"}]}}