Lucene search

K
openvasCopyright (C) 2009 Greenbone AGOPENVAS:1361412562310800972
HistoryNov 13, 2009 - 12:00 a.m.

Sun Java JDK/JRE Multiple Vulnerabilities (Nov 2009) - Windows

2009-11-1300:00:00
Copyright (C) 2009 Greenbone AG
plugins.openvas.org
23

6.6 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.947 High

EPSS

Percentile

99.2%

Sun Java JDK/JRE is prone to Multiple Vulnerabilities.

# SPDX-FileCopyrightText: 2009 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.800972");
  script_version("2024-02-08T05:05:59+0000");
  script_tag(name:"last_modification", value:"2024-02-08 05:05:59 +0000 (Thu, 08 Feb 2024)");
  script_tag(name:"creation_date", value:"2009-11-13 15:48:12 +0100 (Fri, 13 Nov 2009)");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_cve_id("CVE-2009-3877", "CVE-2009-3876", "CVE-2009-3875", "CVE-2009-3873",
                "CVE-2009-3874", "CVE-2009-3872", "CVE-2009-3871", "CVE-2009-3869",
                "CVE-2009-3868", "CVE-2009-3867");
  script_name("Sun Java JDK/JRE Multiple Vulnerabilities (Nov 2009) - Windows");
  script_xref(name:"URL", value:"http://secunia.com/advisories/37231");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36881");
  script_xref(name:"URL", value:"http://java.sun.com/javase/6/webnotes/6u17.html");
  script_xref(name:"URL", value:"http://www.vupen.com/english/advisories/2009/3131");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2009 Greenbone AG");
  script_family("General");
  script_dependencies("gb_java_prdts_detect_portable_win.nasl");
  script_mandatory_keys("Sun/Java/JDK_or_JRE/Win/installed");

  script_tag(name:"impact", value:"Successful exploitation allows remote attacker to execute arbitrary code,
  gain escalated privileges, bypass security restrictions and cause denial
  of service attacks inside the context of the affected system.");

  script_tag(name:"affected", value:"Sun Java JDK/JRE 6 prior to 6 Update 17

  Sun Java JDK/JRE 5 prior to 5 Update 22

  Sun Java JDK/JRE 1.4.x prior to 1.4.2_24

  Sun Java JDK/JRE 1.3.x prior to 1.3.1_27 on Windows.");

  script_tag(name:"insight", value:"Multiple flaws occur due to:

  - Error when decoding 'DER' encoded data and parsing HTTP headers.

  - Error when verifying 'HMAC' digests.

  - Integer overflow error in the 'JPEG JFIF' Decoder while processing
  malicious image files.

  - A buffer overflow error in the 'setDiffICM()' and 'setBytePixels()'
  functions in the Abstract Window Toolkit (AWT).

  - Unspecified error due to improper parsing of color profiles of images.

  - A buffer overflow error due to improper implementation of the
  'HsbParser.getSoundBank()' function.

  - Three unspecified errors when processing audio or image files.");

  script_tag(name:"solution", value:"Upgrade to JDK/JRE version 6 Update 17 or later.

  Upgrade to JDK/JRE version 5 Update 22

  Upgrade to JDK/JRE version 1.4.2_24

  Upgrade to JDK/JRE version 1.3.1_27.");

  script_tag(name:"summary", value:"Sun Java JDK/JRE is prone to Multiple Vulnerabilities.");

  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("version_func.inc");

ver = get_kb_item("Sun/Java/JRE/Win/Ver");
if(!ver)
  ver = get_kb_item("Sun/Java/JDK/Win/Ver");

if(!ver || ver !~ "^1\.[3-6]\.")
  exit(0);

if(version_in_range(version:ver, test_version:"1.3", test_version2:"1.3.1.26")||
   version_in_range(version:ver, test_version:"1.4", test_version2:"1.4.2.23")||
   version_in_range(version:ver, test_version:"1.5", test_version2:"1.5.0.21")||
   version_in_range(version:ver, test_version:"1.6", test_version2:"1.6.0.16")){
  security_message( port: 0, data: "The target host was found to be vulnerable" );
  exit(0);
}

6.6 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.947 High

EPSS

Percentile

99.2%