Lucene search

K

Oracle Java SE Multiple Remote Code Execution Vulnerabilities (Windows)

🗓️ 17 Jan 2013 00:00:00Reported by Copyright (c) 2013 Greenbone Networks GmbHType 
openvas
 openvas
🔗 plugins.openvas.org👁 30 Views

Oracle Java SE Multiple Remote Code Execution Vulnerabilities (Windows). This host is installed with Oracle Java SE and is prone to multiple code execution vulnerabilities. Errors in Java Management Extensions (JMX) MBean components allow remote attackers to execute arbitrary code via unspecified vectors, including an unspecified error within the Libraries subcomponent. Successful exploitation allows remote attackers to execute arbitrary code via unspecified vectors, affecting Oracle Java version 7 before Update 11 on Windows. It is advised to upgrade to Oracle Java 7 Update 11 or later

Show more
Related
Refs
Code
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_oracle_java_se_mult_code_execution_vuln_win.nasl 7699 2017-11-08 12:10:34Z santu $
#
# Oracle Java SE Multiple Remote Code Execution Vulnerabilities (Windows)
#
# Authors:
# Antu Sanadi <[email protected]>
#
# Copyright:
# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_insight = "- An error in Java Management Extensions (JMX) MBean components which allows
    remote attackers to execute arbitrary code via unspecified vectors.
  - An unspecified error exists within the Libraries subcomponent.

  NOTE: The vendor reports that only version 7.x is affected. However,
        some security researchers indicate that some 6.x versions may
        be affected";

tag_impact = "Successful exploitation allows remote attackers to execute arbitrary code
  via unspecified vectors,
  Impact Level: System/Application";

tag_affected = "Oracle Java version 7 before Update 11 on windows";
tag_solution = "Upgrade to Oracle Java 7 Update 11 or later
  For updates refer to
  http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html";
tag_summary = "This host is installed with Oracle Java SE and is prone to multiple
  code execution vulnerabilities.";

if(description)
{
  script_id(803156);
  script_version("$Revision: 7699 $");
  script_cve_id("CVE-2012-3174", "CVE-2013-0422");
  script_bugtraq_id(57246, 57312);
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"$Date: 2017-11-08 13:10:34 +0100 (Wed, 08 Nov 2017) $");
  script_tag(name:"creation_date", value:"2013-01-17 12:41:59 +0530 (Thu, 17 Jan 2013)");
  script_name("Oracle Java SE Multiple Remote Code Execution Vulnerabilities (Windows)");
  script_xref(name : "URL" , value : "http://secunia.com/advisories/51820/");
  script_xref(name : "URL" , value : "http://securitytracker.com/id?1027972");
  script_xref(name : "URL" , value : "http://www.kb.cert.org/vuls/id/625617");
  script_xref(name : "URL" , value : "http://www.oracle.com/technetwork/java/javase/7u11-relnotes-1896856.html");
  script_xref(name : "URL" , value : "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2013 Greenbone Networks GmbH");
  script_family("General");
  script_dependencies("gb_java_prdts_detect_win.nasl");
  script_require_keys("Sun/Java/JRE/Win/Ver");
  script_tag(name : "impact" , value : tag_impact);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}

include("version_func.inc");

## Variable Initialization
jreVer = "";

## Get JRE Version from KB
jreVer = get_kb_item("Sun/Java/JRE/Win/Ver");

if(jreVer)
{
  ## Check for Oracle Java SE versions 1.7 to 1.7.0_10
  if(version_in_range(version:jreVer, test_version:"1.7", test_version2:"1.7.0.10")){
    security_message(0);
  }
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo