CentOS Update for java CESA-2016:1776 centos5. Check the version of java. An insufficient bytecode verification flaw was discovered in the Hotspot component in OpenJDK. Multiple denial of service flaws were found in the JAXP component in OpenJDK. Multiple flaws were found in the CORBA and Hotsport components in OpenJDK
Reporter | Title | Published | Views | Family All 185 |
---|---|---|---|---|
![]() | RHEL 5 / 6 / 7 : java-1.6.0-openjdk (RHSA-2016:1776) | 29 Aug 201600:00 | – | nessus |
![]() | Scientific Linux Security Update : java-1.6.0-openjdk on SL5.x, SL6.x, SL7.x i386/x86_64 (20160826) | 29 Aug 201600:00 | – | nessus |
![]() | Ubuntu 12.04 LTS : openjdk-6 vulnerabilities (USN-3077-1) | 13 Sep 201600:00 | – | nessus |
![]() | Debian DLA-579-1 : openjdk-7 security update | 8 Aug 201600:00 | – | nessus |
![]() | Amazon Linux AMI : java-1.6.0-openjdk (ALAS-2016-748) | 16 Sep 201600:00 | – | nessus |
![]() | Debian DSA-3641-1 : openjdk-7 - security update | 15 Aug 201600:00 | – | nessus |
![]() | Oracle Linux 5 / 6 / 7 : java-1.6.0-openjdk (ELSA-2016-1776) | 29 Aug 201600:00 | – | nessus |
![]() | CentOS 5 / 6 / 7 : java-1.6.0-openjdk (CESA-2016:1776) | 29 Aug 201600:00 | – | nessus |
![]() | RHEL 5 / 6 / 7 : java-1.6.0-sun (RHSA-2016:1477) | 22 Jul 201600:00 | – | nessus |
![]() | Amazon Linux AMI : java-1.7.0-openjdk (ALAS-2016-729) | 2 Aug 201600:00 | – | nessus |
# SPDX-FileCopyrightText: 2016 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.882548");
script_version("2023-07-12T05:05:04+0000");
script_tag(name:"last_modification", value:"2023-07-12 05:05:04 +0000 (Wed, 12 Jul 2023)");
script_tag(name:"creation_date", value:"2016-08-27 05:39:25 +0200 (Sat, 27 Aug 2016)");
script_cve_id("CVE-2016-3458", "CVE-2016-3500", "CVE-2016-3508", "CVE-2016-3550",
"CVE-2016-3606");
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-09-08 12:59:00 +0000 (Tue, 08 Sep 2020)");
script_tag(name:"qod_type", value:"package");
script_name("CentOS Update for java CESA-2016:1776 centos5");
script_tag(name:"summary", value:"Check the version of java");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The java-1.6.0-openjdk packages provide
the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Java Software
Development Kit.
Security Fix(es):
* An insufficient bytecode verification flaw was discovered in the Hotspot
component in OpenJDK. An untrusted Java application or applet could use
this flaw to completely bypass Java sandbox restrictions. (CVE-2016-3606)
* Multiple denial of service flaws were found in the JAXP component in
OpenJDK. A specially crafted XML file could cause a Java application using
JAXP to consume an excessive amount of CPU and memory when parsed.
(CVE-2016-3500, CVE-2016-3508)
* Multiple flaws were found in the CORBA and Hotsport components in
OpenJDK. An untrusted Java application or applet could use these flaws to
bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)");
script_tag(name:"affected", value:"java on CentOS 5");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_xref(name:"CESA", value:"2016:1776");
script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2016-August/022054.html");
script_tag(name:"solution_type", value:"VendorFix");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2016 Greenbone AG");
script_family("CentOS Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "CentOS5")
{
if ((res = isrpmvuln(pkg:"java-1.6.0-openjdk", rpm:"java-1.6.0-openjdk~1.6.0.40~1.13.12.4.el5_11", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"java-1.6.0-openjdk-demo", rpm:"java-1.6.0-openjdk-demo~1.6.0.40~1.13.12.4.el5_11", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"java-1.6.0-openjdk-devel", rpm:"java-1.6.0-openjdk-devel~1.6.0.40~1.13.12.4.el5_11", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"java-1.6.0-openjdk-javadoc", rpm:"java-1.6.0-openjdk-javadoc~1.6.0.40~1.13.12.4.el5_11", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"java-1.6.0-openjdk-src", rpm:"java-1.6.0-openjdk-src~1.6.0.40~1.13.12.4.el5_11", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo