Lucene search

K
openvasCopyright (C) 2011 Greenbone AGOPENVAS:1361412562310902344
HistoryFeb 28, 2011 - 12:00 a.m.

Oracle Java SE Multiple Unspecified Vulnerabilities - Windows

2011-02-2800:00:00
Copyright (C) 2011 Greenbone AG
plugins.openvas.org
19

9.4 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.083 Low

EPSS

Percentile

94.3%

Sun Java SE is prone to multiple unspecified vulnerabilities.

# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.902344");
  script_version("2024-02-15T05:05:39+0000");
  script_tag(name:"last_modification", value:"2024-02-15 05:05:39 +0000 (Thu, 15 Feb 2024)");
  script_tag(name:"creation_date", value:"2011-02-28 11:12:07 +0100 (Mon, 28 Feb 2011)");
  script_cve_id("CVE-2010-4447", "CVE-2010-4448", "CVE-2010-4454", "CVE-2010-4462",
                "CVE-2010-4465", "CVE-2010-4466", "CVE-2010-4469", "CVE-2010-4473",
                "CVE-2010-4475", "CVE-2010-4476");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_name("Oracle Java SE Multiple Unspecified Vulnerabilities - Windows");
  script_xref(name:"URL", value:"http://www.vupen.com/english/advisories/2011/0405");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46091");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46391");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46394");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46398");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46400");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46403");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46406");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46409");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46410");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46411");
  script_xref(name:"URL", value:"http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html");

  script_tag(name:"qod_type", value:"registry");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_family("General");
  script_dependencies("gb_java_prdts_detect_portable_win.nasl");
  script_mandatory_keys("Sun/Java/JDK_or_JRE/Win/installed");
  script_tag(name:"impact", value:"Successful attacks will allow attackers to manipulate or gain knowledge of
  sensitive information, bypass restrictions, cause a denial of service or
  compromise a vulnerable system.");
  script_tag(name:"affected", value:"Oracle Java SE 1.4.2_29 and prior,
  Oracle Java SE 6 Update 23 and 5 Update 27 and prior.");
  script_tag(name:"insight", value:"The flaws are due to:

  - Error in 'JRE' allows remote untrusted Java Web Start applications and
    untrusted Java applets to affect confidentiality, integrity via unknown
    vectors related to Deployment and Networking.

  - Error in 'JRE' component, which allows remote attackers to affect
    confidentiality, integrity, and availability via unknown vectors related to
    Sound, Swing, HotSpot and unspecified APIs.");
  script_tag(name:"solution", value:"Upgrade to Oracle Java SE 6 Update 24 or later");
  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"summary", value:"Sun Java SE is prone to multiple unspecified vulnerabilities.");
  exit(0);
}

include("smb_nt.inc");
include("version_func.inc");

jreVer = get_kb_item("Sun/Java/JRE/Win/Ver");
if(jreVer)
{

  if(version_is_less_equal(version:jreVer, test_version:"1.4.2.29") ||
     version_in_range(version:jreVer, test_version:"1.6", test_version2:"1.6.0.23") ||
     version_in_range(version:jreVer, test_version:"1.5", test_version2:"1.5.0.27"))
  {
    security_message( port: 0, data: "The target host was found to be vulnerable" );
    exit(0);
  }
}

jdkVer = get_kb_item("Sun/Java/JDK/Win/Ver");
if(jdkVer)
{
  if(version_is_less_equal(version:jdkVer, test_version:"1.4.2.29") ||
     version_in_range(version:jdkVer, test_version:"1.6", test_version2:"1.6.0.23") ||
     version_in_range(version:jdkVer, test_version:"1.5", test_version2:"1.5.0.27")){
     security_message( port: 0, data: "The target host was found to be vulnerable" );
     exit(0);
  }
}

exit(99);

9.4 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.083 Low

EPSS

Percentile

94.3%