Oracle Java SE JRE Multiple Unspecified Vulnerabilities-02 (Oct 2014) - Windows. Multiple flaws in Deployment subcomponent, XXE injection error, and error in handling of splash images. Successful exploitation allows attackers to perform actions with escalated privileges, disclose sensitive info, and compromise the user's system. Affected versions: Oracle Java SE 6 update 81 and prior, 7 update 67 and prior, and 8 update 20 and prior on Windows. Apply the patch from the referenced advisory
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
OpenVAS | Oracle Java SE JRE Multiple Unspecified Vulnerabilities-02 (Oct 2014) - Linux | 20 Oct 201400:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2014:1541-1) | 9 Jun 202100:00 | – | openvas |
OpenVAS | SUSE: Security Advisory for java-1_7_1-ibm (SUSE-SU-2014:1549-1) | 16 Oct 201500:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2015:0345-1) | 9 Jun 202100:00 | – | openvas |
OpenVAS | SUSE: Security Advisory for IBM Java (SUSE-SU-2014:1526-1) | 13 Oct 201500:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2014:1549-1) | 19 Apr 202100:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2014:1526-1) | 9 Jun 202100:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2015:0392-1) | 9 Jun 202100:00 | – | openvas |
OpenVAS | SUSE: Security Advisory for java-1_6_0-ibm (SUSE-SU-2015:0392-1) | 16 Oct 201500:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2015:0344-1) | 9 Jun 202100:00 | – | openvas |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/70569 |
securityfocus | www.securityfocus.com/bid/70484 |
securityfocus | www.securityfocus.com/bid/70565 |
securityfocus | www.securityfocus.com/bid/70518 |
securityfocus | www.securityfocus.com/bid/70552 |
securityfocus | www.securityfocus.com/bid/70456 |
securityfocus | www.securityfocus.com/bid/70507 |
securityfocus | www.securityfocus.com/bid/70460 |
oracle | www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html |
securityfocus | www.securityfocus.com/bid/70468 |
# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.804863");
script_version("2024-02-20T14:37:13+0000");
script_cve_id("CVE-2014-6532", "CVE-2014-6517", "CVE-2014-6515", "CVE-2014-6513",
"CVE-2014-6503", "CVE-2014-6493", "CVE-2014-6492", "CVE-2014-6466",
"CVE-2014-6458", "CVE-2014-4288");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2024-02-20 14:37:13 +0000 (Tue, 20 Feb 2024)");
script_tag(name:"creation_date", value:"2014-10-20 12:40:38 +0530 (Mon, 20 Oct 2014)");
script_name("Oracle Java SE JRE Multiple Unspecified Vulnerabilities-02 (Oct 2014) - Windows");
script_tag(name:"summary", value:"Oracle Java SE JRE is prone to multiple unspecified vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to:
- Multiple errors related to the Deployment subcomponent.
- An XXE (Xml eXternal Entity) injection error in
com/sun/org/apache/xerces/internal/impl/XMLEntityManager.java script.
- An error in windows/native/sun/awt/splashscreen/splashscreen_sys.c script
related to handling of splash images.");
script_tag(name:"impact", value:"Successful exploitation will allow attackers
to perform certain actions with escalated privileges, disclose sensitive
information and compromise a user's system.");
script_tag(name:"affected", value:"Oracle Java SE 6 update 81 and prior,
7 update 67 and prior, and 8 update 20 and prior on Windows.");
script_tag(name:"solution", value:"Apply the patch from the referenced advisory.");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"URL", value:"http://secunia.com/advisories/61609/");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70456");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70460");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70468");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70470");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70484");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70507");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70518");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70552");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70565");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/70569");
script_xref(name:"URL", value:"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2014 Greenbone AG");
script_family("General");
script_dependencies("gb_java_prdts_detect_portable_win.nasl");
script_mandatory_keys("Sun/Java/JRE/Win/Ver");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
cpe_list = make_list("cpe:/a:oracle:jre", "cpe:/a:sun:jre");
if(!infos = get_app_version_and_location_from_list(cpe_list:cpe_list, exit_no_version:TRUE))
exit(0);
vers = infos["version"];
path = infos["location"];
if(vers =~ "^1\.[6-8]") {
if(version_in_range(version:vers, test_version:"1.6.0", test_version2:"1.6.0.81")||
version_in_range(version:vers, test_version:"1.7.0", test_version2:"1.7.0.67")||
version_in_range(version:vers, test_version:"1.8.0", test_version2:"1.8.0.20")) {
security_message( port: 0, data: "The target host was found to be vulnerable" );
exit(0);
}
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo