Lucene search

K
openvasCopyright (c) 2010 Greenbone Networks GmbHOPENVAS:840527
HistoryNov 04, 2010 - 12:00 a.m.

Ubuntu Update for openjdk-6, openjdk-6b18 vulnerabilities USN-1010-1

2010-11-0400:00:00
Copyright (c) 2010 Greenbone Networks GmbH
plugins.openvas.org
34

0.241 Low

EPSS

Percentile

96.1%

Ubuntu Update for Linux kernel vulnerabilities USN-1010-1

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_ubuntu_USN_1010_1.nasl 7965 2017-12-01 07:38:25Z santu $
#
# Ubuntu Update for openjdk-6, openjdk-6b18 vulnerabilities USN-1010-1
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

include("revisions-lib.inc");
tag_insight = "Marsh Ray and Steve Dispensa discovered a flaw in the TLS and
  SSLv3 protocols. If an attacker could perform a man in the middle
  attack at the start of a TLS connection, the attacker could inject
  arbitrary content at the beginning of the user's session. USN-923-1
  disabled SSL/TLS renegotiation by default; this update implements
  the TLS Renegotiation Indication Extension as defined in RFC 5746,
  and thus supports secure renegotiation between updated clients and
  servers. (CVE-2009-3555)

  It was discovered that the HttpURLConnection class did not validate
  request headers set by java applets, which could allow an attacker to
  trigger actions otherwise not allowed to HTTP clients. (CVE-2010-3541)

  It was discovered that JNDI could leak information that would allow an
  attacker to to access information about otherwise-protected internal
  network names. (CVE-2010-3548)

  It was discovered that HttpURLConnection improperly handled the
  "chunked" transfer encoding method, which could allow attackers to
  conduct HTTP response splitting attacks. (CVE-2010-3549)

  It was discovered that the NetworkInterface class improperly
  checked the network "connect" permissions for local network
  addresses. This could allow an attacker to read local network
  addresses. (CVE-2010-3551)

  It was discovered that UIDefault.ProxyLazyValue had unsafe reflection
  usage, allowing an attacker to create objects. (CVE-2010-3553)

  It was discovered that multiple flaws in the CORBA reflection
  implementation could allow an attacker to execute arbitrary code by
  misusing permissions granted to certain system objects. (CVE-2010-3554)

  It was discovered that unspecified flaws in the Swing library could
  allow untrusted applications to modify the behavior and state of
  certain JDK classes. (CVE-2010-3557)

  It was discovered that the privileged accept method of the ServerSocket
  class in the CORBA implementation allowed it to receive connections
  from any host, instead of just the host of the current connection.
  An attacker could use this flaw to bypass restrictions defined by
  network permissions. (CVE-2010-3561)

  It was discovered that there exists a double free in java's
  indexColorModel that could allow an attacker to cause an applet
  or application to crash, or possibly execute arbitrary code
  with the privilege of the user running the java applet or
  application. (CVE-2010-3562)

  It was discovered that the Kerberos implementation improperly checked
  AP-REQ requests ...

  Description truncated, for more information please check the Reference URL";

tag_summary = "Ubuntu Update for Linux kernel vulnerabilities USN-1010-1";
tag_affected = "openjdk-6, openjdk-6b18 vulnerabilities on Ubuntu 8.04 LTS ,
  Ubuntu 9.10 ,
  Ubuntu 10.04 LTS";
tag_solution = "Please Install the Updated Packages.";


if(description)
{
  script_xref(name: "URL" , value: "http://www.ubuntu.com/usn/usn-1010-1/");
  script_id(840527);
  script_version("$Revision: 7965 $");
  script_tag(name:"last_modification", value:"$Date: 2017-12-01 08:38:25 +0100 (Fri, 01 Dec 2017) $");
  script_tag(name:"creation_date", value:"2010-11-04 12:09:38 +0100 (Thu, 04 Nov 2010)");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_xref(name: "USN", value: "1010-1");
  script_cve_id("CVE-2009-3555", "CVE-2010-3541", "CVE-2010-3548", "CVE-2010-3549", "CVE-2010-3551", "CVE-2010-3553", "CVE-2010-3554", "CVE-2010-3557", "CVE-2010-3561", "CVE-2010-3562", "CVE-2010-3564", "CVE-2010-3565", "CVE-2010-3566", "CVE-2010-3567", "CVE-2010-3568", "CVE-2010-3569", "CVE-2010-3573", "CVE-2010-3574");
  script_name("Ubuntu Update for openjdk-6, openjdk-6b18 vulnerabilities USN-1010-1");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2010 Greenbone Networks GmbH");
  script_family("Ubuntu Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages");
  script_tag(name : "summary" , value : tag_summary);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("pkg-lib-deb.inc");

release = get_kb_item("ssh/login/release");


res = "";
if(release == NULL){
  exit(0);
}

if(release == "UBUNTU9.10")
{

  if ((res = isdpkgvuln(pkg:"icedtea-6-jre-cacao", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"icedtea6-plugin", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-dbg", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-demo", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jdk", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre-headless", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre-zero", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-doc", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre-lib", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-source", ver:"6b18-1.8.2-4ubuntu1~9.10.1", rls:"UBUNTU9.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}


if(release == "UBUNTU10.04 LTS")
{

  if ((res = isdpkgvuln(pkg:"icedtea-6-jre-cacao", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"icedtea6-plugin", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-dbg", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-demo", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jdk", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre-headless", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre-zero", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-doc", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre-lib", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-source", ver:"6b18-1.8.2-4ubuntu2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}


if(release == "UBUNTU8.04 LTS")
{

  if ((res = isdpkgvuln(pkg:"icedtea6-plugin", ver:"6b18-1.8.2-4ubuntu1~8.04.1", rls:"UBUNTU8.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-dbg", ver:"6b18-1.8.2-4ubuntu1~8.04.1", rls:"UBUNTU8.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-demo", ver:"6b18-1.8.2-4ubuntu1~8.04.1", rls:"UBUNTU8.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jdk", ver:"6b18-1.8.2-4ubuntu1~8.04.1", rls:"UBUNTU8.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre-headless", ver:"6b18-1.8.2-4ubuntu1~8.04.1", rls:"UBUNTU8.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre", ver:"6b18-1.8.2-4ubuntu1~8.04.1", rls:"UBUNTU8.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-doc", ver:"6b18-1.8.2-4ubuntu1~8.04.1", rls:"UBUNTU8.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-jre-lib", ver:"6b18-1.8.2-4ubuntu1~8.04.1", rls:"UBUNTU8.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"openjdk-6-source", ver:"6b18-1.8.2-4ubuntu1~8.04.1", rls:"UBUNTU8.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}