Lucene search

K
openvasCopyright (C) 2011 Greenbone Networks GmbHOPENVAS:1361412562310880658
HistoryAug 09, 2011 - 12:00 a.m.

CentOS Update for java CESA-2010:0768 centos5 i386

2011-08-0900:00:00
Copyright (C) 2011 Greenbone Networks GmbH
plugins.openvas.org
15

6.7 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.296 Low

EPSS

Percentile

96.9%

The remote host is missing an update for the

# Copyright (C) 2011 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

if(description)
{
  script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2010-October/017081.html");
  script_oid("1.3.6.1.4.1.25623.1.0.880658");
  script_version("2022-07-05T11:37:00+0000");
  script_tag(name:"last_modification", value:"2022-07-05 11:37:00 +0000 (Tue, 05 Jul 2022)");
  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_xref(name:"CESA", value:"2010:0768");
  script_cve_id("CVE-2009-3555", "CVE-2010-3541", "CVE-2010-3548", "CVE-2010-3549", "CVE-2010-3551", "CVE-2010-3553", "CVE-2010-3554", "CVE-2010-3557", "CVE-2010-3561", "CVE-2010-3562", "CVE-2010-3564", "CVE-2010-3565", "CVE-2010-3567", "CVE-2010-3568", "CVE-2010-3569", "CVE-2010-3573", "CVE-2010-3574", "CVE-2010-3566");
  script_name("CentOS Update for java CESA-2010:0768 centos5 i386");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'java'
  package(s) announced via the referenced advisory.");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2011 Greenbone Networks GmbH");
  script_family("CentOS Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
  script_tag(name:"affected", value:"java on CentOS 5");
  script_tag(name:"insight", value:"These packages provide the OpenJDK 6 Java Runtime Environment and the
  OpenJDK 6 Software Development Kit.

  defaultReadObject of the Serialization API could be tricked into setting a
  volatile field multiple times, which could allow a remote attacker to
  execute arbitrary code with the privileges of the user running the applet
  or application. (CVE-2010-3569)

  Race condition in the way objects were deserialized could allow an
  untrusted applet or application to misuse the privileges of the user
  running the applet or application. (CVE-2010-3568)

  Miscalculation in the OpenType font rendering implementation caused
  out-of-bounds memory access, which could allow remote attackers to execute
  code with the privileges of the user running the java process.
  (CVE-2010-3567)

  JPEGImageWriter.writeImage in the imageio API improperly checked certain
  image metadata, which could allow a remote attacker to execute arbitrary
  code in the context of the user running the applet or application.
  (CVE-2010-3565)

  Double free in IndexColorModel could cause an untrusted applet or
  application to crash or, possibly, execute arbitrary code with the
  privileges of the user running the applet or application. (CVE-2010-3562)

  The privileged accept method of the ServerSocket class in the Common Object
  Request Broker Architecture (CORBA) implementation in OpenJDK allowed it to
  receive connections from any host, instead of just the host of the current
  connection. An attacker could use this flaw to bypass restrictions defined
  by network permissions. (CVE-2010-3561)

  Flaws in the Swing library could allow an untrusted application to modify
  the behavior and state of certain JDK classes. (CVE-2010-3557)

  Flaws in the CORBA implementation could allow an attacker to execute
  arbitrary code by misusing permissions granted to certain system objects.
  (CVE-2010-3554)

  UIDefault.ProxyLazyValue had unsafe reflection usage, allowing untrusted
  callers to create objects via ProxyLazyValue values. (CVE-2010-3553)

  HttpURLConnection improperly handled the 'chunked' transfer encoding
  method, which could allow remote attackers to conduct HTTP response
  splitting attacks. (CVE-2010-3549)

  HttpURLConnection improperly checked whether the calling code was granted
  the 'allowHttpTrace' permission, allowing untrusted code to create HTTP
  TRACE requests. (CVE-2010-3574)

  HttpURLConnection did not validate request headers set by applets, which
  could allow remote attackers to trigger actions otherwise restricted to
  HTTP clients. (CVE-2010-3541, C ...

  Description truncated, please see the referenced URL(s) for more information.");
  script_tag(name:"solution", value:"Please install the updated packages.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "CentOS5") {
  if(!isnull(res = isrpmvuln(pkg:"java-1.6.0-openjdk", rpm:"java-1.6.0-openjdk~1.6.0.0~1.16.b17.el5", rls:"CentOS5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"java-1.6.0-openjdk-demo", rpm:"java-1.6.0-openjdk-demo~1.6.0.0~1.16.b17.el5", rls:"CentOS5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"java-1.6.0-openjdk-devel", rpm:"java-1.6.0-openjdk-devel~1.6.0.0~1.16.b17.el5", rls:"CentOS5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"java-1.6.0-openjdk-javadoc", rpm:"java-1.6.0-openjdk-javadoc~1.6.0.0~1.16.b17.el5", rls:"CentOS5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"java-1.6.0-openjdk-src", rpm:"java-1.6.0-openjdk-src~1.6.0.0~1.16.b17.el5", rls:"CentOS5"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

6.7 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.296 Low

EPSS

Percentile

96.9%