RedHat Update for java-1.6.0-openjdk RHSA-2013:0605-01 includes critical security patches fixing memory corruption issues and arbitrary code execution vulnerabilities
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | java-1.7.0-openjdk security update | 6 Mar 201300:00 | – | oraclelinux |
![]() | java-1.6.0-openjdk security update | 6 Mar 201300:00 | – | oraclelinux |
![]() | java-1.6.0-openjdk security update | 6 Mar 201300:00 | – | oraclelinux |
![]() | java-1.7.0-openjdk security update | 6 Mar 201300:00 | – | oraclelinux |
![]() | Oracle Linux 5 : java-1.7.0-openjdk (ELSA-2013-0603) | 12 Jul 201300:00 | – | nessus |
![]() | CentOS 5 : java-1.7.0-openjdk (CESA-2013:0603) | 8 Mar 201300:00 | – | nessus |
![]() | RHEL 5 / 6 : java-1.7.0-oracle (RHSA-2013:0600) | 7 Mar 201300:00 | – | nessus |
![]() | Ubuntu 10.04 LTS / 11.10 / 12.04 LTS : openjdk-6 vulnerabilities (USN-1755-1) | 6 Mar 201300:00 | – | nessus |
![]() | Amazon Linux AMI : java-1.7.0-openjdk (ALAS-2013-168) | 4 Sep 201300:00 | – | nessus |
![]() | Fedora 17 : java-1.7.0-openjdk-1.7.0.9-2.3.8.0.fc17 (2013-3467) | 7 Mar 201300:00 | – | nessus |
Source | Link |
---|---|
redhat | www.redhat.com/archives/rhsa-announce/2013-March/msg00019.html |
###############################################################################
# OpenVAS Vulnerability Test
#
# RedHat Update for java-1.6.0-openjdk RHSA-2013:0605-01
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_insight = "These packages provide the OpenJDK 6 Java Runtime Environment and the
OpenJDK 6 Software Development Kit.
An integer overflow flaw was found in the way the 2D component handled
certain sample model instances. A specially-crafted sample model instance
could cause Java Virtual Machine memory corruption and, possibly, lead to
arbitrary code execution with virtual machine privileges. (CVE-2013-0809)
It was discovered that the 2D component did not properly reject certain
malformed images. Specially-crafted raster parameters could cause Java
Virtual Machine memory corruption and, possibly, lead to arbitrary code
execution with virtual machine privileges. (CVE-2013-1493)
Note: If your system has not yet been upgraded to Red Hat Enterprise Linux
6.4 and the web browser plug-in provided by the icedtea-web package was
installed, the issues exposed via Java applets could have been exploited
without user interaction if a user visited a malicious website. Thus, this
update has been rated as having critical security impact as a one time
exception. The icedtea-web package as provided with Red Hat Enterprise
Linux 6.4 uses OpenJDK 7 instead.
This erratum also upgrades the OpenJDK package to IcedTea6 1.11.9. Refer to
the NEWS file, linked to in the References, for further information.
All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.";
tag_affected = "java-1.6.0-openjdk on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_xref(name : "URL" , value : "https://www.redhat.com/archives/rhsa-announce/2013-March/msg00019.html");
script_id(870957);
script_version("$Revision: 6687 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-12 11:46:43 +0200 (Wed, 12 Jul 2017) $");
script_tag(name:"creation_date", value:"2013-03-08 10:18:58 +0530 (Fri, 08 Mar 2013)");
script_cve_id("CVE-2013-0809", "CVE-2013-1493");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_xref(name: "RHSA", value: "2013:0605-01");
script_name("RedHat Update for java-1.6.0-openjdk RHSA-2013:0605-01");
script_summary("Check for the Version of java-1.6.0-openjdk");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2013 Greenbone Networks GmbH");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "RHENT_6")
{
if ((res = isrpmvuln(pkg:"java-1.6.0-openjdk", rpm:"java-1.6.0-openjdk~1.6.0.0~1.57.1.11.9.el6_4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"java-1.6.0-openjdk-debuginfo", rpm:"java-1.6.0-openjdk-debuginfo~1.6.0.0~1.57.1.11.9.el6_4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"java-1.6.0-openjdk-devel", rpm:"java-1.6.0-openjdk-devel~1.6.0.0~1.57.1.11.9.el6_4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"java-1.6.0-openjdk-javadoc", rpm:"java-1.6.0-openjdk-javadoc~1.6.0.0~1.57.1.11.9.el6_4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo