Oracle Java SE Multiple Remote Code Execution Vulnerabilities (Windows). This host is installed with Oracle Java SE and is prone to multiple code execution vulnerabilities. Errors in Java Management Extensions (JMX) MBean components allow remote attackers to execute arbitrary code via unspecified vectors, including an unspecified error within the Libraries subcomponent. Successful exploitation allows remote attackers to execute arbitrary code via unspecified vectors, affecting Oracle Java version 7 before Update 11 on Windows. It is advised to upgrade to Oracle Java 7 Update 11 or later
Reporter | Title | Published | Views | Family All 125 |
---|---|---|---|---|
![]() | Fedora 16 : java-1.7.0-openjdk-1.7.0.9-2.3.4.fc16 (2013-0888) | 17 Jan 201300:00 | – | nessus |
![]() | Oracle Java SE 7 <= Update 10 Remote Code Execution | 10 Jan 201200:00 | – | nessus |
![]() | Ubuntu 12.10 : openjdk-7 vulnerabilities (USN-1693-1) | 17 Jan 201300:00 | – | nessus |
![]() | Oracle Java SE 7 < Update 11 Multiple Vulnerabilities (Unix) | 22 Feb 201300:00 | – | nessus |
![]() | Fedora 17 : java-1.7.0-openjdk-1.7.0.9-2.3.4.fc17 (2013-0868) | 17 Jan 201300:00 | – | nessus |
![]() | RHEL 5 / 6 : java-1.7.0-oracle (RHSA-2013:0156) | 15 Jan 201300:00 | – | nessus |
![]() | CentOS 5 / 6 : java-1.7.0-openjdk (CESA-2013:0165) | 17 Jan 201300:00 | – | nessus |
![]() | Oracle Java SE 7 < Update 11 Multiple Vulnerabilities | 14 Jan 201300:00 | – | nessus |
![]() | openSUSE Security Update : java-1_7_0-openjdk (openSUSE-SU-2013:0199-1) | 13 Jun 201400:00 | – | nessus |
![]() | Fedora 18 : java-1.7.0-openjdk-1.7.0.9-2.3.4.fc18 (2013-0853) | 17 Jan 201300:00 | – | nessus |
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_oracle_java_se_mult_code_execution_vuln_win.nasl 7699 2017-11-08 12:10:34Z santu $
#
# Oracle Java SE Multiple Remote Code Execution Vulnerabilities (Windows)
#
# Authors:
# Antu Sanadi <[email protected]>
#
# Copyright:
# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
tag_insight = "- An error in Java Management Extensions (JMX) MBean components which allows
remote attackers to execute arbitrary code via unspecified vectors.
- An unspecified error exists within the Libraries subcomponent.
NOTE: The vendor reports that only version 7.x is affected. However,
some security researchers indicate that some 6.x versions may
be affected";
tag_impact = "Successful exploitation allows remote attackers to execute arbitrary code
via unspecified vectors,
Impact Level: System/Application";
tag_affected = "Oracle Java version 7 before Update 11 on windows";
tag_solution = "Upgrade to Oracle Java 7 Update 11 or later
For updates refer to
http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html";
tag_summary = "This host is installed with Oracle Java SE and is prone to multiple
code execution vulnerabilities.";
if(description)
{
script_id(803156);
script_version("$Revision: 7699 $");
script_cve_id("CVE-2012-3174", "CVE-2013-0422");
script_bugtraq_id(57246, 57312);
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"$Date: 2017-11-08 13:10:34 +0100 (Wed, 08 Nov 2017) $");
script_tag(name:"creation_date", value:"2013-01-17 12:41:59 +0530 (Thu, 17 Jan 2013)");
script_name("Oracle Java SE Multiple Remote Code Execution Vulnerabilities (Windows)");
script_xref(name : "URL" , value : "http://secunia.com/advisories/51820/");
script_xref(name : "URL" , value : "http://securitytracker.com/id?1027972");
script_xref(name : "URL" , value : "http://www.kb.cert.org/vuls/id/625617");
script_xref(name : "URL" , value : "http://www.oracle.com/technetwork/java/javase/7u11-relnotes-1896856.html");
script_xref(name : "URL" , value : "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2013 Greenbone Networks GmbH");
script_family("General");
script_dependencies("gb_java_prdts_detect_win.nasl");
script_require_keys("Sun/Java/JRE/Win/Ver");
script_tag(name : "impact" , value : tag_impact);
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name : "insight" , value : tag_insight);
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("version_func.inc");
## Variable Initialization
jreVer = "";
## Get JRE Version from KB
jreVer = get_kb_item("Sun/Java/JRE/Win/Ver");
if(jreVer)
{
## Check for Oracle Java SE versions 1.7 to 1.7.0_10
if(version_in_range(version:jreVer, test_version:"1.7", test_version2:"1.7.0.10")){
security_message(0);
}
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo