SuSE 10 Security Update for IBM Java 1.5.0 SR
Reporter | Title | Published | Views | Family All 148 |
---|---|---|---|---|
OpenVAS | SLES9: Security update for IBMJava5-JRE, IBMJava5-SDK | 10 Oct 200900:00 | – | openvas |
OpenVAS | SLES9: Security update for IBMJava5-JRE,IBMJava5-SDK | 10 Oct 200900:00 | – | openvas |
OpenVAS | SLES9: Security update for Sun Java 2 | 10 Oct 200900:00 | – | openvas |
OpenVAS | SuSE Update for Sun Java SUSE-SA:2007:055 | 28 Jan 200900:00 | – | openvas |
OpenVAS | SLES9: Security update for Sun Java 2 | 10 Oct 200900:00 | – | openvas |
OpenVAS | HP-UX Update for Java JRE and JDK HPSBUX02284 | 5 May 200900:00 | – | openvas |
OpenVAS | HP-UX Update for Java JRE and JDK HPSBUX02284 | 5 May 200900:00 | – | openvas |
OpenVAS | SLES9: Security update for IBM Java 2 JRE and SDK | 10 Oct 200900:00 | – | openvas |
OpenVAS | SLES9: Security update for IBM Java 5 and JRE | 10 Oct 200900:00 | – | openvas |
OpenVAS | SLES9: Security update for IBM Java 5 and JRE | 10 Oct 200900:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The text description of this plugin is (C) Novell, Inc.
#
if (NASL_LEVEL < 3000) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(29476);
script_version("1.19");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2007-3698", "CVE-2007-4381", "CVE-2007-5232", "CVE-2007-5236", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-5273", "CVE-2007-5274");
script_name(english:"SuSE 10 Security Update : java-1_5_0-ibm (ZYPP Patch Number 4687)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote SuSE 10 host is missing a security-related patch."
);
script_set_attribute(
attribute:"description",
value:
"The IBM Java JRE/SDK has been brought to release 1.5.0 SR6, containing
several bugfixes, including the following security fixes :
- A vulnerability in the Java Runtime Environment (JRE)
with applet caching may allow an untrusted applet that
is downloaded from a malicious website to make network
connections to network services on machines other than
the one that the applet was downloaded from. This may
allow network resources (such as web pages) and
vulnerabilities (that exist on these network services)
which are not otherwise normally accessible to be
accessed or exploited. (CVE-2007-5232)
- A vulnerability in the Java Runtime Environment (JRE)
may allow malicious JavaScript code that is downloaded
by a browser from a malicious website to make network
connections, through Java APIs, to network services on
machines other than the one that the JavaScript code was
downloaded from. This may allow network resources (such
as web pages) and vulnerabilities (that exist on these
network services) which are not otherwise normally
accessible to be accessed or exploited. (CVE-2007-5274)
- A second vulnerability in the JRE may allow an untrusted
applet that is downloaded from a malicious website
through a web proxy to make network connections to
network services on machines other than the one that the
applet was downloaded from. This may allow network
resources (such as web pages) and vulnerabilities (that
exist on these network services) which are not otherwise
normally accessible to be accessed or exploited.
(CVE-2007-5273)
- An untrusted Java Web Start application may write
arbitrary files with the privileges of the user running
the application. (CVE-2007-5236)
- Three separate vulnerabilities may allow an untrusted
Java Web Start application to determine the location of
the Java Web Start cache. (CVE-2007-5238)
- An untrusted Java Web Start application or Java applet
may move or copy arbitrary files by requesting the user
of the application or applet to drag and drop a file
from the Java Web Start application or Java applet
window. (CVE-2007-5239)
- An untrusted applet may display an over-sized window so
that the applet warning banner is not visible to the
user running the untrusted applet. CVE-2007-4381: A
vulnerability in the font parsing code in the Java
Runtime Environment may allow an untrusted applet to
elevate its privileges. For example, an applet may grant
itself permissions to read and write local files or
execute local applications that are accessible to the
user running the untrusted applet. (CVE-2007-5240)
- The Java Secure Socket Extension (JSSE) that is included
in various releases of the Java Runtime Environment does
not correctly process SSL/TLS handshake requests. This
vulnerability may be exploited to create a Denial of
Service (DoS) condition to the system as a whole on a
server that listens for SSL/TLS connections using JSSE
for SSL/TLS support. (CVE-2007-3698)
For more information see:
http://www-128.ibm.com/developerworks/java/jdk/alerts/
Additionally a concurrency bug has been fixed (Novell Bug 330713)."
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2007-3698.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2007-4381.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2007-5232.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2007-5236.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2007-5238.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2007-5239.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2007-5240.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2007-5273.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2007-5274.html"
);
script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 4687.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_cwe_id(264);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux");
script_set_attribute(attribute:"patch_publication_date", value:"2007/11/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/13");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE.");
if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages.");
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) exit(1, "Failed to determine the architecture type.");
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented.");
flag = 0;
if (rpm_check(release:"SLED10", sp:1, reference:"java-1_5_0-ibm-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLED10", sp:1, reference:"java-1_5_0-ibm-demo-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLED10", sp:1, reference:"java-1_5_0-ibm-devel-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLED10", sp:1, reference:"java-1_5_0-ibm-src-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLED10", sp:1, cpu:"i586", reference:"java-1_5_0-ibm-alsa-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLED10", sp:1, cpu:"i586", reference:"java-1_5_0-ibm-jdbc-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLED10", sp:1, cpu:"i586", reference:"java-1_5_0-ibm-plugin-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLED10", sp:1, cpu:"x86_64", reference:"java-1_5_0-ibm-32bit-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLED10", sp:1, cpu:"x86_64", reference:"java-1_5_0-ibm-alsa-32bit-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLED10", sp:1, cpu:"x86_64", reference:"java-1_5_0-ibm-devel-32bit-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLES10", sp:1, reference:"java-1_5_0-ibm-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLES10", sp:1, reference:"java-1_5_0-ibm-devel-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLES10", sp:1, reference:"java-1_5_0-ibm-fonts-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLES10", sp:1, cpu:"i586", reference:"java-1_5_0-ibm-alsa-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLES10", sp:1, cpu:"i586", reference:"java-1_5_0-ibm-jdbc-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLES10", sp:1, cpu:"i586", reference:"java-1_5_0-ibm-plugin-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLES10", sp:1, cpu:"x86_64", reference:"java-1_5_0-ibm-32bit-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLES10", sp:1, cpu:"x86_64", reference:"java-1_5_0-ibm-alsa-32bit-1.5.0_sr6-0.4")) flag++;
if (rpm_check(release:"SLES10", sp:1, cpu:"x86_64", reference:"java-1_5_0-ibm-devel-32bit-1.5.0_sr6-0.4")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else exit(0, "The host is not affected.");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo