Lucene search

K
openvasCopyright (C) 2014 Greenbone AGOPENVAS:1361412562310108411
HistoryOct 20, 2014 - 12:00 a.m.

Oracle Java SE JRE Multiple Unspecified Vulnerabilities-01 (Oct 2014) - Linux

2014-10-2000:00:00
Copyright (C) 2014 Greenbone AG
plugins.openvas.org
25

4.9 Medium

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.033 Low

EPSS

Percentile

91.3%

Oracle Java SE JRE is prone to multiple unspecified vulnerabilities.

# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.108411");
  script_version("2024-02-20T14:37:13+0000");
  script_cve_id("CVE-2014-6558", "CVE-2014-6531", "CVE-2014-6502", "CVE-2014-6512",
                "CVE-2014-6511", "CVE-2014-6506", "CVE-2014-6457");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2024-02-20 14:37:13 +0000 (Tue, 20 Feb 2024)");
  script_tag(name:"creation_date", value:"2014-10-20 12:20:38 +0530 (Mon, 20 Oct 2014)");

  script_name("Oracle Java SE JRE Multiple Unspecified Vulnerabilities-01 (Oct 2014) - Linux");

  script_tag(name:"summary", value:"Oracle Java SE JRE is prone to multiple unspecified vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to:

  - An unspecified error in share/classes/javax/crypto/CipherInputStream.java script
    related to streaming of input cipher streams.

  - An error in share/classes/java/util/ResourceBundle.java script related to
    property processing and handling of names.

  - An error in the 'LogRecord::readObject' function in
    classes/java/util/logging/LogRecord.java related to handling of resource bundles.

  - An error related to the wrapping of datagram sockets in the DatagramSocket
    implementation.

  - An error in share/classes/java/util/logging/Logger.java related to missing
    permission checks of logger resources.

  - An error related to handling of server certificate changes during SSL/TLS
    renegotiation.

  - An error within the 2D subcomponent of the client deployment.");

  script_tag(name:"impact", value:"Successful exploitation will allow attackers
  to bypass security restrictions, disclose sensitive information, manipulate
  certain data, conduct IP spoofing attacks or hijack a mutually authenticated
  session.");

  script_tag(name:"affected", value:"Oracle Java SE 5 update 71 and prior,
  6 update 81 and prior, 7 update 67 and prior, and 8 update 20 and prior on
  Linux");

  script_tag(name:"solution", value:"Apply the patch from the referenced advisory.");

  script_tag(name:"qod_type", value:"executable_version");
  script_tag(name:"solution_type", value:"VendorFix");

  script_xref(name:"URL", value:"http://secunia.com/advisories/61609/");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70533");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70538");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70544");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70548");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70556");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70567");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70572");
  script_xref(name:"URL", value:"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2014 Greenbone AG");
  script_family("General");
  script_dependencies("gb_java_prdts_detect_lin.nasl");
  script_mandatory_keys("Sun/Java/JRE/Linux/Ver");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

cpe_list = make_list("cpe:/a:oracle:jre", "cpe:/a:oracle:jdk", "cpe:/a:sun:jre", "cpe:/a:sun:jdk");

if(!infos = get_app_version_and_location_from_list(cpe_list:cpe_list, exit_no_version:TRUE))
  exit(0);

vers = infos["version"];
path = infos["location"];

if(vers =~ "^1\.[5-8]") {
  if(version_in_range(version:vers, test_version:"1.5.0", test_version2:"1.5.0.71")||
     version_in_range(version:vers, test_version:"1.6.0", test_version2:"1.6.0.81")||
     version_in_range(version:vers, test_version:"1.7.0", test_version2:"1.7.0.67")||
     version_in_range(version:vers, test_version:"1.8.0", test_version2:"1.8.0.20")) {
    security_message( port: 0, data: "The target host was found to be vulnerable" );
    exit(0);
  }
}

exit(99);

4.9 Medium

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.033 Low

EPSS

Percentile

91.3%