Lucene search

K
openvasCopyright (C) 2018 Greenbone Networks GmbHOPENVAS:1361412562310843491
HistoryApr 03, 2018 - 12:00 a.m.

Ubuntu Update for openjdk-7 USN-3614-1

2018-04-0300:00:00
Copyright (C) 2018 Greenbone Networks GmbH
plugins.openvas.org
27

0.003 Low

EPSS

Percentile

66.8%

The remote host is missing an update for the

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_ubuntu_USN_3614_1.nasl 14140 2019-03-13 12:26:09Z cfischer $
#
# Ubuntu Update for openjdk-7 USN-3614-1
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.843491");
  script_version("$Revision: 14140 $");
  script_tag(name:"last_modification", value:"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $");
  script_tag(name:"creation_date", value:"2018-04-03 08:51:06 +0200 (Tue, 03 Apr 2018)");
  script_cve_id("CVE-2018-2579", "CVE-2018-2588", "CVE-2018-2599", "CVE-2018-2602",
                "CVE-2018-2603", "CVE-2018-2618", "CVE-2018-2629", "CVE-2018-2633",
                "CVE-2018-2634", "CVE-2018-2637", "CVE-2018-2641", "CVE-2018-2663",
                "CVE-2018-2677", "CVE-2018-2678");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:P");
  script_tag(name:"qod_type", value:"package");
  script_name("Ubuntu Update for openjdk-7 USN-3614-1");
  script_tag(name:"summary", value:"The remote host is missing an update for the 'openjdk-7'
  package(s) announced via the referenced advisory.");
  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
  script_tag(name:"insight", value:"It was discovered that a race condition
  existed in the cryptography implementation in OpenJDK. An attacker could
  possibly use this to expose sensitive information. (CVE-2018-2579) It was
  discovered that the LDAP implementation in OpenJDK did not properly encode login
  names. A remote attacker could possibly use this to expose sensitive
  information. (CVE-2018-2588) It was discovered that the DNS client
  implementation in OpenJDK did not properly randomize source ports. A remote
  attacker could use this to spoof responses to DNS queries made by Java
  applications. (CVE-2018-2599) It was discovered that the Internationalization
  component of OpenJDK did not restrict search paths when loading resource bundle
  classes. A local attacker could use this to trick a user into running malicious
  code. (CVE-2018-2602) It was discovered that OpenJDK did not properly restrict
  memory allocations when parsing DER input. A remote attacker could possibly use
  this to cause a denial of service. (CVE-2018-2603) It was discovered that the
  Java Cryptography Extension (JCE) implementation in OpenJDK in some situations
  did guarantee sufficient strength of keys during key agreement. An attacker
  could use this to expose sensitive information. (CVE-2018-2618) It was
  discovered that the Java GSS implementation in OpenJDK in some situations did
  not properly handle GSS contexts in the native GSS library. An attacker could
  possibly use this to access unauthorized resources. (CVE-2018-2629) It was
  discovered that the LDAP implementation in OpenJDK did not properly handle LDAP
  referrals in some situations. An attacker could possibly use this to expose
  sensitive information or gain unauthorized privileges. (CVE-2018-2633) It was
  discovered that the Java GSS implementation in OpenJDK in some situations did
  not properly apply subject credentials. An attacker could possibly use this to
  expose sensitive information or gain access to unauthorized resources.
  (CVE-2018-2634) It was discovered that the Java Management Extensions (JMX)
  component of OpenJDK did not properly apply deserialization filters in some
  situations. An attacker could use this to bypass deserialization restrictions.
  (CVE-2018-2637) It was discovered that a use-after-free vulnerability existed in
  the AWT component of OpenJDK when loading the GTK library. An attacker could
  possibly use this to execute arbitrary code and escape Java sandbox
  restrictions. (CVE-2018-2641) It was discovered that in some situations OpenJDK
  did not properly validate objects when performing deserialization. An attacker
  could use this to cause a denial of service (application cras ... Description
  truncated, for more information please check the Reference URL");
  script_tag(name:"affected", value:"openjdk-7 on Ubuntu 14.04 LTS");
  script_tag(name:"solution", value:"Please Install the Updated Packages.");

  script_xref(name:"USN", value:"3614-1");
  script_xref(name:"URL", value:"http://www.ubuntu.com/usn/usn-3614-1/");
  script_tag(name:"solution_type", value:"VendorFix");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2018 Greenbone Networks GmbH");
  script_family("Ubuntu Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU14\.04 LTS");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

release = dpkg_get_ssh_release();
if(!release)
  exit(0);

res = "";

if(release == "UBUNTU14.04 LTS")
{

  if ((res = isdpkgvuln(pkg:"icedtea-7-jre-jamvm:amd64", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"icedtea-7-jre-jamvm:i386", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-7-jdk:amd64", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-7-jdk:i386", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-7-jre:amd64", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-7-jre:i386", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-7-jre-headless:amd64", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-7-jre-headless:i386", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-7-jre-lib", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-7-jre-zero:amd64", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-7-jre-zero:i386", ver:"7u171-2.6.13-0ubuntu0.14.04.2", rls:"UBUNTU14.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }


  if (__pkg_match) exit(99);
  exit(0);
}