Lucene search

K
openvasCopyright (c) 2011 Greenbone Networks GmbHOPENVAS:840712
HistoryAug 02, 2011 - 12:00 a.m.

Ubuntu Update for icedtea-web USN-1178-1

2011-08-0200:00:00
Copyright (c) 2011 Greenbone Networks GmbH
plugins.openvas.org
13

0.011 Low

EPSS

Percentile

84.6%

Ubuntu Update for Linux kernel vulnerabilities USN-1178-1

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_ubuntu_USN_1178_1.nasl 7964 2017-12-01 07:32:11Z santu $
#
# Ubuntu Update for icedtea-web USN-1178-1
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

include("revisions-lib.inc");
tag_insight = "Omair Majid discovered that an unsigned Web Start application
  or applet could determine the path to the cache directory used
  to store downloaded class and jar files by querying class loader
  properties. This could allow a remote attacker to discover a user's
  name and home directory path. (CVE-2011-2513)

  Omair Majid discovered that an unsigned Web Start application could
  manipulate the content of the security warning dialog message to show
  different file names in prompts. This could allow a remote attacker
  to confuse a user into granting access to a different file than they
  believe they are granting access to. This issue only affected Ubuntu
  11.04. (CVE-2011-2514)";

tag_summary = "Ubuntu Update for Linux kernel vulnerabilities USN-1178-1";
tag_affected = "icedtea-web on Ubuntu 11.04 ,
  Ubuntu 10.10 ,
  Ubuntu 10.04 LTS";
tag_solution = "Please Install the Updated Packages.";


if(description)
{
  script_xref(name: "URL" , value: "http://www.ubuntu.com/usn/usn-1178-1/");
  script_id(840712);
  script_version("$Revision: 7964 $");
  script_tag(name:"last_modification", value:"$Date: 2017-12-01 08:32:11 +0100 (Fri, 01 Dec 2017) $");
  script_tag(name:"creation_date", value:"2011-08-02 09:08:31 +0200 (Tue, 02 Aug 2011)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_xref(name: "USN", value: "1178-1");
  script_cve_id("CVE-2011-2513", "CVE-2011-2514");
  script_name("Ubuntu Update for icedtea-web USN-1178-1");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
  script_family("Ubuntu Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages");
  script_tag(name : "summary" , value : tag_summary);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("pkg-lib-deb.inc");

release = get_kb_item("ssh/login/release");


res = "";
if(release == NULL){
  exit(0);
}

if(release == "UBUNTU10.10")
{

  if ((res = isdpkgvuln(pkg:"icedtea6-plugin", ver:"6b20-1.9.9-0ubuntu1~10.10.2", rls:"UBUNTU10.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}


if(release == "UBUNTU10.04 LTS")
{

  if ((res = isdpkgvuln(pkg:"icedtea6-plugin", ver:"6b20-1.9.9-0ubuntu1~10.04.2", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}


if(release == "UBUNTU11.04")
{

  if ((res = isdpkgvuln(pkg:"icedtea-netx", ver:"1.1.1-0ubuntu1~11.04.1", rls:"UBUNTU11.04")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isdpkgvuln(pkg:"icedtea-plugin", ver:"1.1.1-0ubuntu1~11.04.1", rls:"UBUNTU11.04")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}