ID SUSE-SU-2017:1387-1 Type suse Reporter Suse Modified 2017-05-23T21:14:27
Description
This update for java-1_7_1-ibm fixes the following issues:
Version update to 7.1-4.5 bsc#1038505
- CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
- CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
- CVE-2016-9842: zlib: Undefined left shift of negative number
- CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
- CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when
processing XML data
- CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated
connections
- CVE-2017-3511: OpenJDK: untrusted extension directories search path in
Launcher
- CVE-2017-3539: OpenJDK: MD5 allowed for jar verification
- CVE-2017-3533: OpenJDK: newline injection in the FTP client
- CVE-2017-3544: OpenJDK: newline injection in the SMTP client
{"nessus": [{"lastseen": "2019-02-21T01:30:50", "bulletinFamily": "scanner", "description": "An update for java-1.6.0-ibm is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nIBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 6 to version 6 SR16-FP45.\n\nSecurity Fix(es) :\n\n* This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security Vulnerabilities page, listed in the References section.\n(CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, CVE-2017-1289, CVE-2017-3509, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544)", "modified": "2018-11-10T00:00:00", "id": "REDHAT-RHSA-2017-1222.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=100119", "published": "2017-05-11T00:00:00", "title": "RHEL 6 : java-1.6.0-ibm (RHSA-2017:1222)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2017:1222. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100119);\n script_version(\"3.9\");\n script_cvs_date(\"Date: 2018/11/10 11:49:56\");\n\n script_cve_id(\"CVE-2016-9840\", \"CVE-2016-9841\", \"CVE-2016-9842\", \"CVE-2016-9843\", \"CVE-2017-1289\", \"CVE-2017-3509\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n script_xref(name:\"RHSA\", value:\"2017:1222\");\n\n script_name(english:\"RHEL 6 : java-1.6.0-ibm (RHSA-2017:1222)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for java-1.6.0-ibm is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nIBM Java SE version 6 includes the IBM Java Runtime Environment and\nthe IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 6 to version 6 SR16-FP45.\n\nSecurity Fix(es) :\n\n* This update fixes multiple vulnerabilities in the IBM Java Runtime\nEnvironment and the IBM Java Software Development Kit. Further\ninformation about these flaws can be found on the IBM Java Security\nVulnerabilities page, listed in the References section.\n(CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843,\nCVE-2017-1289, CVE-2017-3509, CVE-2017-3533, CVE-2017-3539,\nCVE-2017-3544)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://developer.ibm.com/javasdk/support/security-vulnerabilities/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2017:1222\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9842\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-1289\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3509\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3533\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3539\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3544\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-demo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-javacomm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-src\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2017:1222\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.6.0-ibm-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.6.0-ibm-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.6.0-ibm-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.6.0-ibm-demo-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.6.0-ibm-demo-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.6.0-ibm-demo-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.6.0-ibm-devel-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.6.0-ibm-devel-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.6.0-ibm-devel-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.6.0-ibm-javacomm-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.6.0-ibm-javacomm-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.6.0-ibm-jdbc-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.6.0-ibm-jdbc-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.6.0-ibm-jdbc-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.6.0-ibm-plugin-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.6.0-ibm-plugin-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.6.0-ibm-src-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.6.0-ibm-src-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.6.0-ibm-src-1.6.0.16.45-1jpp.1.el6_9\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1.6.0-ibm / java-1.6.0-ibm-demo / java-1.6.0-ibm-devel / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:30:50", "bulletinFamily": "scanner", "description": "An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nIBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR4-FP5.\n\nSecurity Fix(es) :\n\n* This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security Vulnerabilities page, listed in the References section.\n(CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, CVE-2017-1289, CVE-2017-3509, CVE-2017-3511, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544)", "modified": "2018-11-10T00:00:00", "id": "REDHAT-RHSA-2017-1220.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=100117", "published": "2017-05-11T00:00:00", "title": "RHEL 6 / 7 : java-1.8.0-ibm (RHSA-2017:1220)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2017:1220. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100117);\n script_version(\"3.9\");\n script_cvs_date(\"Date: 2018/11/10 11:49:56\");\n\n script_cve_id(\"CVE-2016-9840\", \"CVE-2016-9841\", \"CVE-2016-9842\", \"CVE-2016-9843\", \"CVE-2017-1289\", \"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n script_xref(name:\"RHSA\", value:\"2017:1220\");\n\n script_name(english:\"RHEL 6 / 7 : java-1.8.0-ibm (RHSA-2017:1220)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for java-1.8.0-ibm is now available for Red Hat Enterprise\nLinux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nIBM Java SE version 8 includes the IBM Java Runtime Environment and\nthe IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR4-FP5.\n\nSecurity Fix(es) :\n\n* This update fixes multiple vulnerabilities in the IBM Java Runtime\nEnvironment and the IBM Java Software Development Kit. Further\ninformation about these flaws can be found on the IBM Java Security\nVulnerabilities page, listed in the References section.\n(CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843,\nCVE-2017-1289, CVE-2017-3509, CVE-2017-3511, CVE-2017-3533,\nCVE-2017-3539, CVE-2017-3544)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://developer.ibm.com/javasdk/support/security-vulnerabilities/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2017:1220\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9842\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-1289\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3509\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3511\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3533\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3539\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3544\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-demo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-src\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x / 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2017:1220\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.8.0-ibm-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.8.0-ibm-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.8.0-ibm-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.8.0-ibm-demo-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.8.0-ibm-demo-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.8.0-ibm-demo-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.8.0-ibm-devel-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.8.0-ibm-devel-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.8.0-ibm-devel-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.8.0-ibm-jdbc-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.8.0-ibm-jdbc-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.8.0-ibm-jdbc-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.8.0-ibm-plugin-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.8.0-ibm-plugin-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.8.0-ibm-src-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.8.0-ibm-src-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.8.0-ibm-src-1.8.0.4.5-1jpp.1.el6_9\")) flag++;\n\n\n if (rpm_check(release:\"RHEL7\", reference:\"java-1.8.0-ibm-1.8.0.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"java-1.8.0-ibm-demo-1.8.0.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"java-1.8.0-ibm-demo-1.8.0.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"java-1.8.0-ibm-devel-1.8.0.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"java-1.8.0-ibm-jdbc-1.8.0.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"java-1.8.0-ibm-jdbc-1.8.0.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"java-1.8.0-ibm-plugin-1.8.0.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"java-1.8.0-ibm-src-1.8.0.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"java-1.8.0-ibm-src-1.8.0.4.5-1jpp.1.el7_3\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1.8.0-ibm / java-1.8.0-ibm-demo / java-1.8.0-ibm-devel / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:30:59", "bulletinFamily": "scanner", "description": "This update for java-1_7_1-ibm fixes the following issues :\n\n - Version update to 7.1-4.5 bsc#1038505\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections\n\n - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP client\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP client\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-11-30T00:00:00", "id": "SUSE_SU-2017-1385-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=100376", "published": "2017-05-24T00:00:00", "title": "SUSE SLES12 Security Update : java-1_7_1-ibm (SUSE-SU-2017:1385-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2017:1385-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100376);\n script_version(\"3.8\");\n script_cvs_date(\"Date: 2018/11/30 10:54:50\");\n\n script_cve_id(\"CVE-2016-9840\", \"CVE-2016-9841\", \"CVE-2016-9842\", \"CVE-2016-9843\", \"CVE-2017-1289\", \"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n\n script_name(english:\"SUSE SLES12 Security Update : java-1_7_1-ibm (SUSE-SU-2017:1385-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for java-1_7_1-ibm fixes the following issues :\n\n - Version update to 7.1-4.5 bsc#1038505\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in\n inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in\n inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative\n number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection\n (XXE) error when processing XML data\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM\n authenticated connections\n\n - CVE-2017-3511: OpenJDK: untrusted extension directories\n search path in Launcher\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP\n client\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP\n client\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1038505\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9840/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9841/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9842/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9843/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-1289/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3509/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3511/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3533/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3539/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3544/\"\n );\n # https://www.suse.com/support/update/announcement/2017/suse-su-20171385-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b99504ca\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12-SP2:zypper in -t\npatch SUSE-SLE-SDK-12-SP2-2017-847=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP1:zypper in -t\npatch SUSE-SLE-SDK-12-SP1-2017-847=1\n\nSUSE Linux Enterprise Server for SAP 12:zypper in -t patch\nSUSE-SLE-SAP-12-2017-847=1\n\nSUSE Linux Enterprise Server 12-SP2:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-2017-847=1\n\nSUSE Linux Enterprise Server 12-SP1:zypper in -t patch\nSUSE-SLE-SERVER-12-SP1-2017-847=1\n\nSUSE Linux Enterprise Server 12-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-2017-847=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = eregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! ereg(pattern:\"^(0|1|2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0/1/2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"java-1_7_1-ibm-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"java-1_7_1-ibm-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"java-1_7_1-ibm-devel-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_7_1-ibm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:30:59", "bulletinFamily": "scanner", "description": "This update for java-1_8_0-ibm fixes the following issues: Version update bsc#1038505 :\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP client\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections\n\n - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP client\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-11-30T00:00:00", "id": "SUSE_SU-2017-1386-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=100377", "published": "2017-05-24T00:00:00", "title": "SUSE SLES12 Security Update : java-1_8_0-ibm (SUSE-SU-2017:1386-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2017:1386-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100377);\n script_version(\"3.8\");\n script_cvs_date(\"Date: 2018/11/30 10:54:50\");\n\n script_cve_id(\"CVE-2016-9840\", \"CVE-2016-9841\", \"CVE-2016-9842\", \"CVE-2016-9843\", \"CVE-2017-1289\", \"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n\n script_name(english:\"SUSE SLES12 Security Update : java-1_8_0-ibm (SUSE-SU-2017:1386-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for java-1_8_0-ibm fixes the following issues: Version\nupdate bsc#1038505 :\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in\n inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in\n inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative\n number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP\n client\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM\n authenticated connections\n\n - CVE-2017-3511: OpenJDK: untrusted extension directories\n search path in Launcher\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP\n client\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection\n (XXE) error when processing XML data\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1038505\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9840/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9841/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9842/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9843/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-1289/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3509/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3511/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3533/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3539/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3544/\"\n );\n # https://www.suse.com/support/update/announcement/2017/suse-su-20171386-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b1e96fe3\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12-SP2:zypper in -t\npatch SUSE-SLE-SDK-12-SP2-2017-844=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP1:zypper in -t\npatch SUSE-SLE-SDK-12-SP1-2017-844=1\n\nSUSE Linux Enterprise Server 12-SP2:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-2017-844=1\n\nSUSE Linux Enterprise Server 12-SP1:zypper in -t patch\nSUSE-SLE-SERVER-12-SP1-2017-844=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = eregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! ereg(pattern:\"^(1|2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP1/2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"java-1_8_0-ibm-1.8.0_sr4.5-29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-1.8.0_sr4.5-29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_8_0-ibm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:32:55", "bulletinFamily": "scanner", "description": "The version of Java SDK installed on the remote AIX host is affected by multiple vulnerabilities in the following subcomponents :\n\n - Multiple vulnerabilities exist in the zlib subcomponent that allow an unauthenticated, remote attacker to trigger denial of service conditions. (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843)\n\n - An unspecified flaw exists in the XML subcomponent that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-1289)\n\n - An unspecified flaw exists in the Networking subcomponent that allows an unauthenticated, remote attacker to impact confidentiality and integrity.\n (CVE-2017-3509)\n\n - An unspecified flaw exists in the JCE subcomponent that allows a local attacker to gain elevated privileges.\n This vulnerability does not affect Java SE version 6.\n (CVE-2017-3511)\n\n - An unspecified flaw exists in the AWT subcomponent that allows an unauthenticated, remote attacker to execute arbitrary code. This vulnerability does not affect Java SE version 6. (CVE-2017-3512)\n\n - An unspecified flaw exists in the AWT subcomponent that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-3514)\n\n - Multiple unspecified flaws exist in the Networking subcomponent that allow an unauthenticated, remote attacker to gain update, insert, or delete access to unauthorized data. (CVE-2017-3533, CVE-2017-3544)\n\n - An unspecified flaw exists in the Security subcomponent that allows an unauthenticated, remote attacker to gain update, insert, or delete access to unauthorized data.\n (CVE-2017-3539)", "modified": "2018-07-17T00:00:00", "id": "AIX_JAVA_APR2017_ADVISORY.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=103189", "published": "2017-09-13T00:00:00", "title": "AIX Java Advisory : java_apr2017_advisory.asc (April 2017 CPU)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(103189);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/07/17 12:00:06\");\n\n script_cve_id(\n \"CVE-2016-9840\",\n \"CVE-2016-9841\",\n \"CVE-2016-9842\",\n \"CVE-2016-9843\",\n \"CVE-2017-1289\",\n \"CVE-2017-3509\",\n \"CVE-2017-3511\",\n \"CVE-2017-3512\",\n \"CVE-2017-3514\",\n \"CVE-2017-3533\",\n \"CVE-2017-3539\",\n \"CVE-2017-3544\"\n );\n script_bugtraq_id(\n 95131,\n 97727,\n 97729,\n 97731,\n 97737,\n 97740,\n 97745,\n 97752,\n 98401\n );\n\n script_name(english:\"AIX Java Advisory : java_apr2017_advisory.asc (April 2017 CPU)\");\n script_summary(english:\"Checks the version of the Java package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Java SDK installed on the remote AIX host is affected\nby multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Java SDK installed on the remote AIX host is affected\nby multiple vulnerabilities in the following subcomponents :\n\n - Multiple vulnerabilities exist in the zlib subcomponent\n that allow an unauthenticated, remote attacker to\n trigger denial of service conditions. (CVE-2016-9840,\n CVE-2016-9841, CVE-2016-9842, CVE-2016-9843)\n\n - An unspecified flaw exists in the XML subcomponent that\n allows an unauthenticated, remote attacker to execute\n arbitrary code. (CVE-2017-1289)\n\n - An unspecified flaw exists in the Networking\n subcomponent that allows an unauthenticated, remote\n attacker to impact confidentiality and integrity.\n (CVE-2017-3509)\n\n - An unspecified flaw exists in the JCE subcomponent that\n allows a local attacker to gain elevated privileges.\n This vulnerability does not affect Java SE version 6.\n (CVE-2017-3511)\n\n - An unspecified flaw exists in the AWT subcomponent\n that allows an unauthenticated, remote attacker to\n execute arbitrary code. This vulnerability does not\n affect Java SE version 6. (CVE-2017-3512)\n\n - An unspecified flaw exists in the AWT subcomponent\n that allows an unauthenticated, remote attacker to\n execute arbitrary code. (CVE-2017-3514)\n\n - Multiple unspecified flaws exist in the Networking\n subcomponent that allow an unauthenticated, remote\n attacker to gain update, insert, or delete access to\n unauthorized data. (CVE-2017-3533, CVE-2017-3544)\n\n - An unspecified flaw exists in the Security subcomponent\n that allows an unauthenticated, remote attacker to gain\n update, insert, or delete access to unauthorized data.\n (CVE-2017-3539)\");\n # http://aix.software.ibm.com/aix/efixes/security/java_apr2017_advisory.asc\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8d03f97b\");\n # https://www-945.ibm.com/support/fixcentral/swg/selectFixes?\n # parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=6.0.0.0&platform=AIX+32-bit,+pSeries&function=all\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ce533d8f\");\n # https://www-945.ibm.com/support/fixcentral/swg/selectFixes?\n # parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=6.0.0.0&platform=AIX+64-bit,+pSeries&function=all\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?17d05c61\");\n # https://www-945.ibm.com/support/fixcentral/swg/selectFixes?\n # parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.0.0.0&platform=AIX+32-bit,+pSeries&function=all\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d4595696\");\n # https://www-945.ibm.com/support/fixcentral/swg/selectFixes?\n # parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.0.0.0&platform=AIX+64-bit,+pSeries&function=all\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9abd5252\");\n # https://www-945.ibm.com/support/fixcentral/swg/selectFixes?\n # parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.1.0.0&platform=AIX+32-bit,+pSeries&function=all\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4ee03dc1\");\n # https://www-945.ibm.com/support/fixcentral/swg/selectFixes?\n # parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.1.0.0&platform=AIX+64-bit,+pSeries&function=all\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8f7a066c\");\n # https://www-945.ibm.com/support/fixcentral/swg/selectFixes?\n # parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&platform=AIX+32-bit,+pSeries&function=all\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?52d4ddf3\");\n # https://www-945.ibm.com/support/fixcentral/swg/selectFixes?\n # parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&platform=AIX+64-bit,+pSeries&function=all\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?343fa903\");\n # http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?623d2c22\");\n script_set_attribute(attribute:\"solution\", value:\n\"Fixes are available by version and can be downloaded from the IBM AIX\nwebsite.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:oracle:jre\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:oracle:jdk\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/09/13\");\n\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"AIX Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\", \"Host/AIX/oslevelsp\");\n\n exit(0);\n}\n\ninclude(\"aix.inc\");\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\noslevel = get_kb_item_or_exit(\"Host/AIX/version\");\nif ( oslevel != \"AIX-5.3\" && oslevel != \"AIX-6.1\" && oslevel != \"AIX-7.1\" && oslevel != \"AIX-7.2\" )\n{\n oslevel = ereg_replace(string:oslevel, pattern:\"-\", replace:\" \");\n audit(AUDIT_OS_NOT, \"AIX 5.3 / 6.1 / 7.1 / 7.2\", oslevel);\n}\n\noslevelcomplete = chomp(get_kb_item(\"Host/AIX/oslevelsp\"));\nif (empty_or_null(oslevelcomplete)) audit(AUDIT_UNKNOWN_APP_VER, \"AIX\");\n\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nflag = 0;\n\n#Java6 6.0.0.645\nif (aix_check_package(release:\"5.3\", package:\"Java6.sdk\", minpackagever:\"6.0.0.0\", maxpackagever:\"6.0.0.644\", fixpackagever:\"6.0.0.645\") > 0) flag++;\nif (aix_check_package(release:\"6.1\", package:\"Java6.sdk\", minpackagever:\"6.0.0.0\", maxpackagever:\"6.0.0.644\", fixpackagever:\"6.0.0.645\") > 0) flag++;\nif (aix_check_package(release:\"7.1\", package:\"Java6.sdk\", minpackagever:\"6.0.0.0\", maxpackagever:\"6.0.0.644\", fixpackagever:\"6.0.0.645\") > 0) flag++;\nif (aix_check_package(release:\"7.2\", package:\"Java6.sdk\", minpackagever:\"6.0.0.0\", maxpackagever:\"6.0.0.644\", fixpackagever:\"6.0.0.645\") > 0) flag++;\nif (aix_check_package(release:\"5.3\", package:\"Java6_64.sdk\", minpackagever:\"6.0.0.0\", maxpackagever:\"6.0.0.644\", fixpackagever:\"6.0.0.645\") > 0) flag++;\nif (aix_check_package(release:\"6.1\", package:\"Java6_64.sdk\", minpackagever:\"6.0.0.0\", maxpackagever:\"6.0.0.644\", fixpackagever:\"6.0.0.645\") > 0) flag++;\nif (aix_check_package(release:\"7.1\", package:\"Java6_64.sdk\", minpackagever:\"6.0.0.0\", maxpackagever:\"6.0.0.644\", fixpackagever:\"6.0.0.645\") > 0) flag++;\nif (aix_check_package(release:\"7.2\", package:\"Java6_64.sdk\", minpackagever:\"6.0.0.0\", maxpackagever:\"6.0.0.644\", fixpackagever:\"6.0.0.645\") > 0) flag++;\n\n#Java7 7.0.0.605\nif (aix_check_package(release:\"6.1\", package:\"Java7.sdk\", minpackagever:\"7.0.0.0\", maxpackagever:\"7.0.0.604\", fixpackagever:\"7.0.0.605\") > 0) flag++;\nif (aix_check_package(release:\"7.1\", package:\"Java7.sdk\", minpackagever:\"7.0.0.0\", maxpackagever:\"7.0.0.604\", fixpackagever:\"7.0.0.605\") > 0) flag++;\nif (aix_check_package(release:\"7.2\", package:\"Java7.sdk\", minpackagever:\"7.0.0.0\", maxpackagever:\"7.0.0.604\", fixpackagever:\"7.0.0.605\") > 0) flag++;\nif (aix_check_package(release:\"6.1\", package:\"Java7_64.sdk\", minpackagever:\"7.0.0.0\", maxpackagever:\"7.0.0.604\", fixpackagever:\"7.0.0.605\") > 0) flag++;\nif (aix_check_package(release:\"7.1\", package:\"Java7_64.sdk\", minpackagever:\"7.0.0.0\", maxpackagever:\"7.0.0.604\", fixpackagever:\"7.0.0.605\") > 0) flag++;\nif (aix_check_package(release:\"7.2\", package:\"Java7_64.sdk\", minpackagever:\"7.0.0.0\", maxpackagever:\"7.0.0.604\", fixpackagever:\"7.0.0.605\") > 0) flag++;\n\n#Java7.1 7.1.0.405\nif (aix_check_package(release:\"6.1\", package:\"Java7.sdk\", minpackagever:\"7.1.0.0\", maxpackagever:\"7.1.0.404\", fixpackagever:\"7.1.0.405\") > 0) flag++;\nif (aix_check_package(release:\"7.1\", package:\"Java7.sdk\", minpackagever:\"7.1.0.0\", maxpackagever:\"7.1.0.404\", fixpackagever:\"7.1.0.405\") > 0) flag++;\nif (aix_check_package(release:\"7.2\", package:\"Java7.sdk\", minpackagever:\"7.1.0.0\", maxpackagever:\"7.1.0.404\", fixpackagever:\"7.1.0.405\") > 0) flag++;\nif (aix_check_package(release:\"6.1\", package:\"Java7_64.sdk\", minpackagever:\"7.1.0.0\", maxpackagever:\"7.1.0.404\", fixpackagever:\"7.1.0.405\") > 0) flag++;\nif (aix_check_package(release:\"7.1\", package:\"Java7_64.sdk\", minpackagever:\"7.1.0.0\", maxpackagever:\"7.1.0.404\", fixpackagever:\"7.1.0.405\") > 0) flag++;\nif (aix_check_package(release:\"7.2\", package:\"Java7_64.sdk\", minpackagever:\"7.1.0.0\", maxpackagever:\"7.1.0.404\", fixpackagever:\"7.1.0.405\") > 0) flag++;\n\n#Java8.0 8.0.0.406\nif (aix_check_package(release:\"6.1\", package:\"Java8.sdk\", minpackagever:\"8.0.0.0\", maxpackagever:\"8.0.0.405\", fixpackagever:\"8.0.0.406\") > 0) flag++;\nif (aix_check_package(release:\"7.1\", package:\"Java8.sdk\", minpackagever:\"8.0.0.0\", maxpackagever:\"8.0.0.405\", fixpackagever:\"8.0.0.406\") > 0) flag++;\nif (aix_check_package(release:\"7.2\", package:\"Java8.sdk\", minpackagever:\"8.0.0.0\", maxpackagever:\"8.0.0.405\", fixpackagever:\"8.0.0.406\") > 0) flag++;\nif (aix_check_package(release:\"6.1\", package:\"Java8_64.sdk\", minpackagever:\"8.0.0.0\", maxpackagever:\"8.0.0.405\", fixpackagever:\"8.0.0.406\") > 0) flag++;\nif (aix_check_package(release:\"7.1\", package:\"Java8_64.sdk\", minpackagever:\"8.0.0.0\", maxpackagever:\"8.0.0.405\", fixpackagever:\"8.0.0.406\") > 0) flag++;\nif (aix_check_package(release:\"7.2\", package:\"Java8_64.sdk\", minpackagever:\"8.0.0.0\", maxpackagever:\"8.0.0.405\", fixpackagever:\"8.0.0.406\") > 0) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : aix_report_get()\n );\n}\nelse\n{\n tested = aix_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Java6 / Java7 / Java8\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:30:50", "bulletinFamily": "scanner", "description": "An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nIBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 7 to version 7R1 SR4-FP5.\n\nSecurity Fix(es) :\n\n* This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security Vulnerabilities page, listed in the References section.\n(CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, CVE-2017-1289, CVE-2017-3509, CVE-2017-3511, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544)", "modified": "2018-11-10T00:00:00", "id": "REDHAT-RHSA-2017-1221.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=100118", "published": "2017-05-11T00:00:00", "title": "RHEL 6 / 7 : java-1.7.1-ibm (RHSA-2017:1221)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2017:1221. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100118);\n script_version(\"3.9\");\n script_cvs_date(\"Date: 2018/11/10 11:49:56\");\n\n script_cve_id(\"CVE-2016-9840\", \"CVE-2016-9841\", \"CVE-2016-9842\", \"CVE-2016-9843\", \"CVE-2017-1289\", \"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n script_xref(name:\"RHSA\", value:\"2017:1221\");\n\n script_name(english:\"RHEL 6 / 7 : java-1.7.1-ibm (RHSA-2017:1221)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for java-1.7.1-ibm is now available for Red Hat Enterprise\nLinux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nIBM Java SE version 7 Release 1 includes the IBM Java Runtime\nEnvironment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 7 to version 7R1 SR4-FP5.\n\nSecurity Fix(es) :\n\n* This update fixes multiple vulnerabilities in the IBM Java Runtime\nEnvironment and the IBM Java Software Development Kit. Further\ninformation about these flaws can be found on the IBM Java Security\nVulnerabilities page, listed in the References section.\n(CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843,\nCVE-2017-1289, CVE-2017-3509, CVE-2017-3511, CVE-2017-3533,\nCVE-2017-3539, CVE-2017-3544)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://developer.ibm.com/javasdk/support/security-vulnerabilities/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2017:1221\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9842\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-9843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-1289\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3509\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3511\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3533\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3539\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-3544\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.7.1-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.7.1-ibm-demo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.7.1-ibm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.7.1-ibm-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.7.1-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:java-1.7.1-ibm-src\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x / 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2017:1221\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.7.1-ibm-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.7.1-ibm-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.7.1-ibm-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.7.1-ibm-demo-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.7.1-ibm-demo-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.7.1-ibm-demo-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.7.1-ibm-devel-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.7.1-ibm-devel-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.7.1-ibm-devel-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.7.1-ibm-jdbc-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.7.1-ibm-jdbc-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.7.1-ibm-jdbc-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.7.1-ibm-plugin-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.7.1-ibm-plugin-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"java-1.7.1-ibm-src-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"java-1.7.1-ibm-src-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"java-1.7.1-ibm-src-1.7.1.4.5-1jpp.2.el6_9\")) flag++;\n\n\n if (rpm_check(release:\"RHEL7\", reference:\"java-1.7.1-ibm-1.7.1.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"java-1.7.1-ibm-demo-1.7.1.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"java-1.7.1-ibm-demo-1.7.1.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"java-1.7.1-ibm-devel-1.7.1.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"java-1.7.1-ibm-jdbc-1.7.1.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"java-1.7.1-ibm-jdbc-1.7.1.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"java-1.7.1-ibm-plugin-1.7.1.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"java-1.7.1-ibm-src-1.7.1.4.5-1jpp.1.el7_3\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"java-1.7.1-ibm-src-1.7.1.4.5-1jpp.1.el7_3\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1.7.1-ibm / java-1.7.1-ibm-demo / java-1.7.1-ibm-devel / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:30:59", "bulletinFamily": "scanner", "description": "This update for java-1_7_0-ibm fixes the following issues: Version update to 7.0-10.5 bsc#1038505\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections\n\n - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP client\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP client\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-11-30T00:00:00", "id": "SUSE_SU-2017-1384-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=100375", "published": "2017-05-24T00:00:00", "title": "SUSE SLES11 Security Update : java-1_7_0-ibm (SUSE-SU-2017:1384-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2017:1384-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100375);\n script_version(\"3.8\");\n script_cvs_date(\"Date: 2018/11/30 10:54:50\");\n\n script_cve_id(\"CVE-2016-9840\", \"CVE-2016-9841\", \"CVE-2016-9842\", \"CVE-2016-9843\", \"CVE-2017-1289\", \"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n\n script_name(english:\"SUSE SLES11 Security Update : java-1_7_0-ibm (SUSE-SU-2017:1384-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for java-1_7_0-ibm fixes the following issues: Version\nupdate to 7.0-10.5 bsc#1038505\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in\n inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in\n inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative\n number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection\n (XXE) error when processing XML data\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM\n authenticated connections\n\n - CVE-2017-3511: OpenJDK: untrusted extension directories\n search path in Launcher\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP\n client\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP\n client\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1038505\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9840/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9841/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9842/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9843/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-1289/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3509/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3511/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3533/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3539/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3544/\"\n );\n # https://www.suse.com/support/update/announcement/2017/suse-su-20171384-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2813b030\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 11-SP3-LTSS:zypper in -t patch\nslessp3-java-1_7_0-ibm-13124=1\n\nSUSE Linux Enterprise Point of Sale 11-SP3:zypper in -t patch\nsleposp3-java-1_7_0-ibm-13124=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_0-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_0-ibm-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_0-ibm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_0-ibm-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_0-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = eregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! ereg(pattern:\"^(3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"java-1_7_0-ibm-alsa-1.7.0_sr10.5-64.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"java-1_7_0-ibm-plugin-1.7.0_sr10.5-64.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"java-1_7_0-ibm-1.7.0_sr10.5-64.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"java-1_7_0-ibm-devel-1.7.0_sr10.5-64.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"java-1_7_0-ibm-alsa-1.7.0_sr10.5-64.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"java-1_7_0-ibm-plugin-1.7.0_sr10.5-64.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_7_0-ibm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:30:59", "bulletinFamily": "scanner", "description": "This update for java-1_7_1-ibm fixes the following issues: Version update to 7.1-4.5 bsc#1038505\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections\n\n - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP client\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP client\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-11-30T00:00:00", "id": "SUSE_SU-2017-1387-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=100378", "published": "2017-05-24T00:00:00", "title": "SUSE SLES11 Security Update : java-1_7_1-ibm (SUSE-SU-2017:1387-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2017:1387-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100378);\n script_version(\"3.8\");\n script_cvs_date(\"Date: 2018/11/30 10:54:50\");\n\n script_cve_id(\"CVE-2016-9840\", \"CVE-2016-9841\", \"CVE-2016-9842\", \"CVE-2016-9843\", \"CVE-2017-1289\", \"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n\n script_name(english:\"SUSE SLES11 Security Update : java-1_7_1-ibm (SUSE-SU-2017:1387-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for java-1_7_1-ibm fixes the following issues: Version\nupdate to 7.1-4.5 bsc#1038505\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in\n inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in\n inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative\n number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection\n (XXE) error when processing XML data\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM\n authenticated connections\n\n - CVE-2017-3511: OpenJDK: untrusted extension directories\n search path in Launcher\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP\n client\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP\n client\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1038505\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9840/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9841/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9842/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9843/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-1289/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3509/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3511/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3533/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3539/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3544/\"\n );\n # https://www.suse.com/support/update/announcement/2017/suse-su-20171387-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0795a9e4\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t\npatch sdksp4-java-1_7_1-ibm-13123=1\n\nSUSE Linux Enterprise Server 11-SP4:zypper in -t patch\nslessp4-java-1_7_1-ibm-13123=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = eregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! ereg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-alsa-1.7.1_sr4.5-25.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-plugin-1.7.1_sr4.5-25.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"java-1_7_1-ibm-1.7.1_sr4.5-25.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"java-1_7_1-ibm-jdbc-1.7.1_sr4.5-25.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"java-1_7_1-ibm-alsa-1.7.1_sr4.5-25.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"java-1_7_1-ibm-plugin-1.7.1_sr4.5-25.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_7_1-ibm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:31:06", "bulletinFamily": "scanner", "description": "This update for java-1_6_0-ibm fixes the following issues :\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP client\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP client\n\n - Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-11-30T00:00:00", "id": "SUSE_SU-2017-1444-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=100540", "published": "2017-05-31T00:00:00", "title": "SUSE SLES11 Security Update : java-1_6_0-ibm (SUSE-SU-2017:1444-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2017:1444-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100540);\n script_version(\"3.7\");\n script_cvs_date(\"Date: 2018/11/30 10:54:50\");\n\n script_cve_id(\"CVE-2016-2183\", \"CVE-2016-9840\", \"CVE-2016-9841\", \"CVE-2016-9842\", \"CVE-2016-9843\", \"CVE-2017-1289\", \"CVE-2017-3509\", \"CVE-2017-3514\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n\n script_name(english:\"SUSE SLES11 Security Update : java-1_6_0-ibm (SUSE-SU-2017:1444-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for java-1_6_0-ibm fixes the following issues :\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in\n inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in\n inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative\n number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection\n (XXE) error when processing XML data\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM\n authenticated connections\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP\n client\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP\n client\n\n - Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1027038\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1038505\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2183/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9840/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9841/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9842/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9843/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-1289/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3509/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3514/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3533/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3539/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3544/\"\n );\n # https://www.suse.com/support/update/announcement/2017/suse-su-20171444-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8c928ab5\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 11-SP3-LTSS:zypper in -t patch\nslessp3-java-1_6_0-ibm-13130=1\n\nSUSE Linux Enterprise Point of Sale 11-SP3:zypper in -t patch\nsleposp3-java-1_6_0-ibm-13130=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-fonts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/31\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = eregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! ereg(pattern:\"^(3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"java-1_6_0-ibm-plugin-1.6.0_sr16.45-84.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"java-1_6_0-ibm-alsa-1.6.0_sr16.45-84.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"java-1_6_0-ibm-1.6.0_sr16.45-84.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"java-1_6_0-ibm-devel-1.6.0_sr16.45-84.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"java-1_6_0-ibm-fonts-1.6.0_sr16.45-84.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"java-1_6_0-ibm-plugin-1.6.0_sr16.45-84.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"java-1_6_0-ibm-alsa-1.6.0_sr16.45-84.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_6_0-ibm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:44:54", "bulletinFamily": "scanner", "description": "This update for java-1_6_0-ibm fixes the following issues :\n\n - Version update to 6.0-16.45 bsc#1038505\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP client\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP client\n\n - Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2019-01-02T00:00:00", "id": "SUSE_SU-2017-1389-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=119998", "published": "2019-01-02T00:00:00", "title": "SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2017:1389-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2017:1389-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119998);\n script_version(\"1.1\");\n script_cvs_date(\"Date: 2019/01/02 10:36:38\");\n\n script_cve_id(\"CVE-2016-2183\", \"CVE-2016-9840\", \"CVE-2016-9841\", \"CVE-2016-9842\", \"CVE-2016-9843\", \"CVE-2017-1289\", \"CVE-2017-3509\", \"CVE-2017-3514\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n\n script_name(english:\"SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2017:1389-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for java-1_6_0-ibm fixes the following issues :\n\n - Version update to 6.0-16.45 bsc#1038505\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in\n inftrees.c\n\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in\n inffast.c\n\n - CVE-2016-9842: zlib: Undefined left shift of negative\n number\n\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n\n - CVE-2017-1289: IBM JDK: XML External Entity Injection\n (XXE) error when processing XML data\n\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM\n authenticated connections\n\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n\n - CVE-2017-3533: OpenJDK: newline injection in the FTP\n client\n\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP\n client\n\n - Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1027038\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1038505\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2183/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9840/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9841/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9842/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9843/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-1289/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3509/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3514/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3533/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3539/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-3544/\"\n );\n # https://www.suse.com/support/update/announcement/2017/suse-su-20171389-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b43ae059\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Legacy Software 12:zypper in -t patch\nSUSE-SLE-Module-Legacy-12-2017-843=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-fonts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_6_0-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = eregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! ereg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"java-1_6_0-ibm-plugin-1.6.0_sr16.45-49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"java-1_6_0-ibm-1.6.0_sr16.45-49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"java-1_6_0-ibm-fonts-1.6.0_sr16.45-49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"java-1_6_0-ibm-jdbc-1.6.0_sr16.45-49.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_6_0-ibm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "redhat": [{"lastseen": "2018-12-11T19:43:22", "bulletinFamily": "unix", "description": "IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 6 to version 6 SR16-FP45.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security Vulnerabilities page, listed in the References section. (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, CVE-2017-1289, CVE-2017-3509, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544)", "modified": "2018-06-07T18:21:39", "published": "2017-05-10T16:23:26", "id": "RHSA-2017:1222", "href": "https://access.redhat.com/errata/RHSA-2017:1222", "type": "redhat", "title": "(RHSA-2017:1222) Moderate: java-1.6.0-ibm security update", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-12-11T19:40:53", "bulletinFamily": "unix", "description": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR4-FP5.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security Vulnerabilities page, listed in the References section. (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, CVE-2017-1289, CVE-2017-3509, CVE-2017-3511, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544)", "modified": "2018-06-07T18:21:47", "published": "2017-05-10T16:22:51", "id": "RHSA-2017:1220", "href": "https://access.redhat.com/errata/RHSA-2017:1220", "type": "redhat", "title": "(RHSA-2017:1220) Moderate: java-1.8.0-ibm security update", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-12-11T19:43:12", "bulletinFamily": "unix", "description": "IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 7 to version 7R1 SR4-FP5.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security Vulnerabilities page, listed in the References section. (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, CVE-2017-1289, CVE-2017-3509, CVE-2017-3511, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544)", "modified": "2018-06-07T18:21:50", "published": "2017-05-10T16:23:11", "id": "RHSA-2017:1221", "href": "https://access.redhat.com/errata/RHSA-2017:1221", "type": "redhat", "title": "(RHSA-2017:1221) Moderate: java-1.7.1-ibm security update", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-12-11T19:41:10", "bulletinFamily": "unix", "description": "Oracle Java SE version 7 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 7 to version 7 Update 141.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2017-3509, CVE-2017-3511, CVE-2017-3526, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544)", "modified": "2018-06-07T18:20:30", "published": "2017-04-24T10:49:21", "id": "RHSA-2017:1118", "href": "https://access.redhat.com/errata/RHSA-2017:1118", "type": "redhat", "title": "(RHSA-2017:1118) Moderate: java-1.7.0-oracle security update", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-12-11T19:42:56", "bulletinFamily": "unix", "description": "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 131.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2017-3509, CVE-2017-3511, CVE-2017-3526, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544)", "modified": "2018-06-07T18:20:30", "published": "2017-04-24T10:49:02", "id": "RHSA-2017:1117", "href": "https://access.redhat.com/errata/RHSA-2017:1117", "type": "redhat", "title": "(RHSA-2017:1117) Moderate: java-1.8.0-oracle security update", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-12-11T19:41:50", "bulletinFamily": "unix", "description": "Oracle Java SE version 6 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 6 to version 6 Update 151.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2017-3509, CVE-2017-3526, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544)", "modified": "2018-06-07T18:20:34", "published": "2017-04-24T10:49:36", "id": "RHSA-2017:1119", "href": "https://access.redhat.com/errata/RHSA-2017:1119", "type": "redhat", "title": "(RHSA-2017:1119) Moderate: java-1.6.0-sun security update", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-12-11T19:41:54", "bulletinFamily": "unix", "description": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An untrusted library search path flaw was found in the JCE component of OpenJDK. A local attacker could possibly use this flaw to cause a Java application using JCE to load an attacker-controlled library and hence escalate their privileges. (CVE-2017-3511)\n\n* It was found that the JAXP component of OpenJDK failed to correctly enforce parse tree size limits when parsing XML document. An attacker able to make a Java application parse a specially crafted XML document could use this flaw to make it consume an excessive amount of CPU and memory. (CVE-2017-3526)\n\n* It was discovered that the HTTP client implementation in the Networking component of OpenJDK could cache and re-use an NTLM authenticated connection in a different security context. A remote attacker could possibly use this flaw to make a Java application perform HTTP requests authenticated with credentials of a different user. (CVE-2017-3509)\n\nNote: This update adds support for the \"jdk.ntlm.cache\" system property which, when set to false, prevents caching of NTLM connections and authentications and hence prevents this issue. However, caching remains enabled by default.\n\n* It was discovered that the Security component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2017-3539)\n\nNote: This updates extends the fix for CVE-2016-5542 released as part of the RHSA-2016:2079 erratum to no longer allow the MD5 hash algorithm during the Jar integrity verification by adding it to the jdk.jar.disabledAlgorithms security property.\n\n* Newline injection flaws were discovered in FTP and SMTP client implementations in the Networking component in OpenJDK. A remote attacker could possibly use these flaws to manipulate FTP or SMTP connections established by a Java application. (CVE-2017-3533, CVE-2017-3544)\n\nNote: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.", "modified": "2018-06-07T18:21:58", "published": "2017-04-20T16:16:38", "id": "RHSA-2017:1109", "href": "https://access.redhat.com/errata/RHSA-2017:1109", "type": "redhat", "title": "(RHSA-2017:1109) Moderate: java-1.8.0-openjdk security update", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "suse": [{"lastseen": "2017-05-25T17:47:36", "bulletinFamily": "unix", "description": "This update for java-1_8_0-ibm fixes the following issues:\n\n Version update bsc#1038505:\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c\n - CVE-2016-9842: zlib: Undefined left shift of negative number\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP client\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections\n - CVE-2017-3511: OpenJDK: untrusted extension directories search path in\n Launcher\n - CVE-2017-3533: OpenJDK: newline injection in the FTP client\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when\n processing XML data\n\n", "modified": "2017-05-23T21:14:04", "published": "2017-05-23T21:14:04", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html", "id": "SUSE-SU-2017:1386-1", "title": "Security update for java-1_8_0-ibm (important)", "type": "suse", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-05-25T17:47:35", "bulletinFamily": "unix", "description": "This update for java-1_7_0-ibm fixes the following issues:\n\n Version update to 7.0-10.5 bsc#1038505\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c\n - CVE-2016-9842: zlib: Undefined left shift of negative number\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when\n processing XML data\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated\n connections\n - CVE-2017-3511: OpenJDK: untrusted extension directories search path in\n Launcher\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n - CVE-2017-3533: OpenJDK: newline injection in the FTP client\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP client\n\n", "modified": "2017-05-23T21:13:05", "published": "2017-05-23T21:13:05", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html", "id": "SUSE-SU-2017:1384-1", "title": "Security update for java-1_7_0-ibm (important)", "type": "suse", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-05-30T18:45:09", "bulletinFamily": "unix", "description": "This update for java-1_6_0-ibm fixes the following issues:\n\n\n - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c\n - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c\n - CVE-2016-9842: zlib: Undefined left shift of negative number\n - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer\n - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when\n processing XML data\n - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated\n connections\n - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification\n - CVE-2017-3533: OpenJDK: newline injection in the FTP client\n - CVE-2017-3544: OpenJDK: newline injection in the SMTP client\n\n - Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183\n\n", "modified": "2017-05-30T18:15:00", "published": "2017-05-30T18:15:00", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html", "id": "SUSE-SU-2017:1444-1", "title": "Security update for java-1_6_0-ibm (important)", "type": "suse", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-06-08T20:14:12", "bulletinFamily": "unix", "description": "This update for java-1_8_0-openjdk fixes the following issues:\n\n - Upgrade to version jdk8u131 (icedtea 3.4.0) - bsc#1034849\n * Security fixes\n - S8163520, CVE-2017-3509: Reuse cache entries\n - S8163528, CVE-2017-3511: Better library loading\n - S8165626, CVE-2017-3512: Improved window framing\n - S8167110, CVE-2017-3514: Windows peering issue\n - S8168699: Validate special case invocations\n - S8169011, CVE-2017-3526: Resizing XML parse trees\n - S8170222, CVE-2017-3533: Better transfers of files\n - S8171121, CVE-2017-3539: Enhancing jar checking\n - S8171533, CVE-2017-3544: Better email transfer\n - S8172299: Improve class processing\n * New features\n - PR1969: Add AArch32 JIT port\n - PR3297: Allow Shenandoah to be used on AArch64\n - PR3340: jstack.stp should support AArch64\n * Import of OpenJDK 8 u131 build 11\n - S6474807: (smartcardio) CardTerminal.connect() throws CardException\n instead of CardNotPresentException\n - S6515172, PR3346: Runtime.availableProcessors() ignores Linux\n taskset command\n - S7155957: closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java\n hangs on win 64 bit with jdk8\n - S7167293: FtpURLConnection connection leak on FileNotFoundException\n - S8035568: [macosx] Cursor management unification\n - S8079595: Resizing dialog which is JWindow parent makes JVM crash\n - S8130769: The new menu can't be shown on the menubar after clicking\n the "Add" button.\n - S8146602: jdk/test/sun/misc/URLClassPath/ClassnameCharTest.java test\n fails with NullPointerException\n - S8147842: IME Composition Window is displayed at incorrect location\n - S8147910, PR3346: Cache initial active_processor_count\n - S8150490: Update OS detection code to recognize Windows Server 2016\n - S8160951: [TEST_BUG]\n javax/xml/bind/marshal/8134111/UnmarshalTest.java should be added\n into :needs_jre group\n - S8160958: [TEST_BUG]\n java/net/SetFactoryPermission/SetFactoryPermission.java should be\n added into :needs_compact2 group\n - S8161147: jvm crashes when -XX:+UseCountedLoopSafepoints is enabled\n - S8161195: Regression:\n closed/javax/swing/text/FlowView/LayoutTest.java\n - S8161993, PR3346: G1 crashes if active_processor_count changes\n during startup\n - S8162876: [TEST_BUG] sun/net/www/protocol/http/HttpInputStream.java\n fails intermittently\n - S8162916: Test sun/security/krb5/auto/UnboundSSL.java fails\n - S8164533: sun/security/ssl/SSLSocketImpl/CloseSocket.java failed\n with "Error while cleaning up threads after test"\n - S8167179: Make XSL generated namespace prefixes local to\n transformation process\n - S8168774: Polymorhic signature method check crashes javac\n - S8169465: Deadlock in com.sun.jndi.ldap.pool.Connections\n - S8169589: [macosx] Activating a JDialog puts to back another dialog\n - S8170307: Stack size option -Xss is ignored\n - S8170316: (tz) Support tzdata2016j\n - S8170814: Reuse cache entries (part II)\n - S8170888, PR3314, RH1284948: [linux] Experimental support for cgroup\n memory limits in container (ie Docker) environments\n - S8171388: Update JNDI Thread contexts\n - S8171949: [macosx] AWT_ZoomFrame Automated tests fail with error:\n The bitwise mask Frame.ICONIFIED is not setwhen the frame is in\n ICONIFIED state\n - S8171952: [macosx]\n AWT_Modality/Automated/ModalExclusion/NoExclusion/ModelessDialog\n test fails as DummyButton on Dialog did not gain focus when clicked.\n - S8173030: Temporary backout fix #8035568 from 8u131-b03\n - S8173031: Temporary backout fix #8171952 from 8u131-b03\n - S8173783, PR3328: IllegalArgumentException: jdk.tls.namedGroups\n - S8173931: 8u131 L10n resource file update\n - S8174844: Incorrect GPL header causes RE script to miss swap to\n commercial header for licensee source bundle\n - S8174985: NTLM authentication doesn't work with IIS if NTLM cache is\n disabled\n - S8176044: (tz) Support tzdata2017a\n * Backports\n - S6457406, PR3335: javadoc doesn't handle <a href='http://...'>\n properly in producing index pages\n - S8030245, PR3335: Update langtools to use try-with-resources and\n multi-catch\n - S8030253, PR3335: Update langtools to use strings-in-switch\n - S8030262, PR3335: Update langtools to use foreach loops\n - S8031113, PR3337: TEST_BUG:\n java/nio/channels/AsynchronousChannelGroup/Basic.java fails\n intermittently\n - S8031625, PR3335: javadoc problems referencing inner class\n constructors\n - S8031649, PR3335: Clean up javadoc tests\n - S8031670, PR3335: Remove unneeded -source options in javadoc tests\n - S8032066, PR3335: Serialized form has broken links to non private\n inner classes of package private\n - S8034174, PR2290: Remove use of JVM_* functions from java.net code\n - S8034182, PR2290: Misc. warnings in java.net code\n - S8035876, PR2290: AIX build issues after '8034174: Remove use\n of JVM_* functions from java.net code'\n - S8038730, PR3335: Clean up the way JavadocTester is invoked, and\n checks for errors.\n - S8040903, PR3335: Clean up use of BUG_ID in javadoc tests\n - S8040904, PR3335: Ensure javadoc tests do not overwrite results\n within tests\n - S8040908, PR3335: javadoc test TestDocEncoding should use\n -notimestamp\n - S8041150, PR3335: Avoid silly use of static methods in JavadocTester\n - S8041253, PR3335: Avoid redundant synonyms of NO_TEST\n - S8043780, PR3368: Use open(O_CLOEXEC) instead of fcntl(FD_CLOEXEC)\n - S8061305, PR3335: Javadoc crashes when method name ends with\n "Property"\n - S8072452, PR3337: Support DHE sizes up to 8192-bits and DSA sizes up\n to 3072-bits\n - S8075565, PR3337: Define @intermittent jtreg keyword and mark\n intermittently failing jdk tests\n - S8075670, PR3337: Remove intermittent keyword from some tests\n - S8078334, PR3337: Mark regression tests using randomness\n - S8078880, PR3337: Mark a few more intermittently failuring\n security-libs\n - S8133318, PR3337: Exclude intermittent failing PKCS11 tests\n on Solaris SPARC 11.1 and earlier\n - S8144539, PR3337: Update PKCS11 tests to run with security manager\n - S8144566, PR3352: Custom HostnameVerifier disables SNI extension\n - S8153711, PR3313, RH1284948: [REDO] JDWP: Memory Leak: GlobalRefs\n never deleted when processing invokeMethod command\n - S8155049, PR3352: New tests from 8144566 fail with "No expected\n Server Name Indication"\n - S8173941, PR3326: SA does not work if executable is DSO\n - S8174164, PR3334, RH1417266: SafePointNode::_replaced_nodes breaks\n with irreducible loops\n - S8174729, PR3336, RH1420518: Race Condition in\n java.lang.reflect.WeakCache\n - S8175097, PR3334, RH1417266: [TESTBUG] 8174164 fix missed the test\n * Bug fixes\n - PR3348: Architectures unsupported by SystemTap tapsets throw a parse\n error\n - PR3378: Perl should be mandatory\n - PR3389: javac.in and javah.in should use @PERL@ rather than a\n hardcoded path\n * AArch64 port\n - S8168699, PR3372: Validate special case invocations [AArch64 support]\n - S8170100, PR3372: AArch64: Crash in C1-compiled code accessing\n References\n - S8172881, PR3372: AArch64: assertion failure: the int pressure is\n incorrect\n - S8173472, PR3372: AArch64: C1 comparisons with null only use 32-bit\n instructions\n - S8177661, PR3372: Correct ad rule output register types from iRegX\n to iRegXNoSp\n * AArch32 port\n - PR3380: Zero should not be enabled by default on arm with the\n AArch32 HotSpot build\n - PR3384, S8139303, S8167584: Add support for AArch32 architecture to\n configure and jdk makefiles\n - PR3385: aarch32 does not support -Xshare:dump\n - PR3386, S8164652: AArch32 jvm.cfg wrong for C1 build\n - PR3387: Installation fails on arm with AArch32 port as\n INSTALL_ARCH_DIR is arm, not aarch32\n - PR3388: Wrong path for jvm.cfg being used on arm with AArch32 build\n * Shenandoah\n - Fix Shenandoah argument checking on 32bit builds.\n - Import from Shenandoah tag\n aarch64-shenandoah-jdk8u101-b14-shenandoah-merge-2016-07-25\n - Import from Shenandoah tag\n aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-02-20\n - Import from Shenandoah tag\n aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-06\n - Import from Shenandoah tag\n aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-09\n - Import from Shenandoah tag\n aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-23\n\n This update was imported from the SUSE:SLE-12-SP1:Update update project.\n\n", "modified": "2017-06-08T18:10:18", "published": "2017-06-08T18:10:18", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html", "id": "OPENSUSE-SU-2017:1507-1", "title": "Security update for java-1_8_0-openjdk (important)", "type": "suse", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-05-25T17:47:35", "bulletinFamily": "unix", "description": "This update for java-1_7_0-openjdk fixes the following issues:\n\n - Update to 2.6.10 - OpenJDK 7u141 (bsc#1034849)\n * Security fixes\n - S8163520, CVE-2017-3509: Reuse cache entries\n - S8163528, CVE-2017-3511: Better library loading\n - S8165626, CVE-2017-3512: Improved window framing\n - S8167110, CVE-2017-3514: Windows peering issue\n - S8169011, CVE-2017-3526: Resizing XML parse trees\n - S8170222, CVE-2017-3533: Better transfers of files\n - S8171121, CVE-2017-3539: Enhancing jar checking\n - S8171533, CVE-2017-3544: Better email transfer\n - S8172299: Improve class processing\n * New features\n - PR3347: jstack.stp should support AArch64\n * Import of OpenJDK 7 u141 build 0\n - S4717864: setFont() does not update Fonts of Menus already on screen\n - S6474807: (smartcardio) CardTerminal.connect() throws CardException\n instead of CardNotPresentException\n - S6518907: cleanup IA64 specific code in Hotspot\n - S6869327: Add new C2 flag to keep safepoints in counted loops.\n - S7112912: Message "Error occurred during initialization of VM" on\n boxes with lots of RAM\n - S7124213: [macosx] pack() does ignore size of a component; doesn't\n on the other platforms\n - S7124219: [macosx] Unable to draw images to fullscreen\n - S7124552: [macosx] NullPointerException in getBufferStrategy()\n - S7148275: [macosx] setIconImages() not working correctly (distorted\n icon when minimized)\n - S7154841: [macosx] Popups appear behind taskbar\n - S7155957: closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java\n hangs on win 64 bit with jdk8\n - S7160627: [macosx] TextArea has wrong initial size\n - S7167293: FtpURLConnection connection leak on FileNotFoundException\n - S7168851: [macosx] Netbeans crashes in\n CImage.nativeCreateNSImageFromArray\n - S7197203: sun/misc/URLClassPath/ClassnameCharTest.sh failed, compile\n error\n - S8005255: [macosx] Cleanup warnings in sun.lwawt\n - S8006088: Incompatible heap size flags accepted by VM\n - S8007295: Reduce number of warnings in awt classes\n - S8010722: assert: failed: heap size is too big for compressed\n oops\n - S8011059: [macosx] Support automatic @2x images loading on Mac OS X\n - S8014058: Regression tests for 8006088\n - S8014489:\n tests/gc/arguments/Test(Serial|CMS|Parallel|G1)HeapSizeFlags jtreg\n tests invoke wrong class\n - S8016302: Change type of the number of GC workers to unsigned int (2)\n - S8024662: gc/arguments/TestUseCompressedOopsErgo.java does not\n compile.\n - S8024669: Native OOME when allocating after changes to maximum heap\n supporting Coops sizing on sparcv9\n - S8024926: [macosx] AquaIcon HiDPI support\n - S8025974: l10n for policytool\n - S8027025: [macosx] getLocationOnScreen returns 0 if parent invisible\n - S8028212: Custom cursor HiDPI support\n - S8028471: PPC64 (part 215): opto: Extend ImplicitNullCheck\n optimization.\n - S8031573: [macosx] Checkmarks of JCheckBoxMenuItems aren't rendered\n in high resolution on Retina\n - S8033534: [macosx] Get MultiResolution image from native system\n - S8033786: White flashing when opening Dialogs and Menus using Nimbus\n with dark background\n - S8035568: [macosx] Cursor management unification\n - S8041734: JFrame in full screen mode leaves empty workspace after\n close\n - S8059803: Update use of GetVersionEx to get correct Windows version\n in hs_err files\n - S8066504: GetVersionEx in\n java.base/windows/native/libjava/java_props_md.c might not get\n correct Windows version 0\n - S8079595: Resizing dialog which is JWindow parent makes JVM crash\n - S8080729: [macosx] java 7 and 8 JDialogs on multiscreen jump to\n parent frame on focus\n - S8130769: The new menu can't be shown on the menubar after clicking\n the "Add" button.\n - S8133357: 8u65 l10n resource file translation update\n - S8146602: jdk/test/sun/misc/URLClassPath/ClassnameCharTest.java test\n fails with NullPointerException\n - S8147842: IME Composition Window is displayed at incorrect location\n - S8147910: Cache initial active_processor_count\n - S8150490: Update OS detection code to recognize Windows Server 2016\n - S8161147: jvm crashes when -XX:+UseCountedLoopSafepoints is enabled\n - S8161195: Regression:\n closed/javax/swing/text/FlowView/LayoutTest.java\n - S8161993: G1 crashes if active_processor_count changes during startup\n - S8162603: Unrecognized VM option 'UseCountedLoopSafepoints'\n - S8162876: [TEST_BUG] sun/net/www/protocol/http/HttpInputStream.java\n fails intermittently\n - S8164533: sun/security/ssl/SSLSocketImpl/CloseSocket.java failed\n with "Error while cleaning up threads after test"\n - S8167179: Make XSL generated namespace prefixes local to\n transformation process\n - S8169465: Deadlock in com.sun.jndi.ldap.pool.Connections\n - S8169589: [macosx] Activating a JDialog puts to back another dialog\n - S8170307: Stack size option -Xss is ignored\n - S8170316: (tz) Support tzdata2016j\n - S8170814: Reuse cache entries (part II)\n - S8171388: Update JNDI Thread contexts\n - S8171949: [macosx] AWT_ZoomFrame Automated tests fail with error:\n The bitwise mask Frame.ICONIFIED is not setwhen the frame is in\n ICONIFIED state\n - S8171952: [macosx]\n AWT_Modality/Automated/ModalExclusion/NoExclusion/ModelessDialog\n test fails as DummyButton on Dialog did not gain focus when clicked.\n - S8173931: 8u131 L10n resource file update\n - S8174844: Incorrect GPL header causes RE script to miss swap to\n commercial header for licensee source bundle\n - S8175087: [bsd] Fix build after "8024900: PPC64: Enable new build on\n AIX (jdk part)"\n - S8175163: [bsd] Fix build after "8005629: javac warnings compiling\n java.awt.EventDispatchThread..."\n - S8176044: (tz) Support tzdata2017a\n * Import of OpenJDK 7 u141 build 1\n - S8043723: max_heap_for_compressed_oops() declared with size_t, but\n defined with uintx\n * Import of OpenJDK 7 u141 build 2\n - S8011123: serialVersionUID of\n java.awt.dnd.InvalidDnDOperationException changed in JDK8-b82\n * Backports\n - S6515172, PR3362: Runtime.availableProcessors() ignores Linux\n taskset command\n - S8022284, PR3209: Hide internal data structure in PhaseCFG\n - S8023003, PR3209: Cleanup the public interface to PhaseCFG\n - S8023691, PR3209: Create interface for nodes in class Block\n - S8023988, PR3209: Move local scheduling of nodes to the CFG creation\n and code motion phase (PhaseCFG)\n - S8043780, PR3369: Use open(O_CLOEXEC) instead of fcntl(FD_CLOEXEC)\n - S8157306, PR3209: Random infrequent null pointer exceptions in javac\n - S8173783, PR3329: IllegalArgumentException: jdk.tls.namedGroups\n - S8173941, PR3330: SA does not work if executable is DSO\n - S8174729, PR3361: Race Condition in java.lang.reflect.WeakCache\n * Bug fixes\n - PR3349: Architectures unsupported by SystemTap tapsets throw a parse\n error\n - PR3370: Disable ARM32 JIT by default in jdk_generic_profile.sh\n - PR3379: Perl should be mandatory\n - PR3390: javac.in and javah.in should use @PERL@ rather than a\n hardcoded path\n * CACAO\n - PR2732: Raise javadoc memory limits for CACAO again!\n * AArch64 port\n - S8177661, PR3367: Correct ad rule output register types from iRegX\n to iRegXNoSp\n\n - Get ecj.jar path from gcj, use the gcc variant that provides Java to\n build C code to make sure jni.h is available.\n\n - S8167104, CVE-2017-3289: Additional class construction\n - S6253144: Long narrowing conversion should describe the\n - S6328537: Improve javadocs for Socket class by adding\n - S6978886: javadoc shows stacktrace after print error\n - S6995421: Eliminate the static dependency to\n - S7027045: (doc) java/awt/Window.java has several typos in\n - S7054969: Null-check-in-finally pattern in java/security\n - S7072353: JNDI libraries do not build with javac -Xlint:all\n - S7092447: Clarify the default locale used in each locale\n - S7103570: AtomicIntegerFieldUpdater does not work when\n - S7187144: JavaDoc for ScriptEngineFactory.getProgram()\n - S8000418: javadoc should used a standard "generated by\n - S8000666: javadoc should write directly to Writer instead of\n - S8000970: break out auxiliary classes that will prevent\n - S8001669: javadoc internal DocletAbortException should set\n - S8011402: Move blacklisting certificate logic from hard code\n - S8011547: Update XML Signature implementation to Apache\n - S8012288: XML DSig API allows wrong tag names and extra\n - S8017325: Cleanup of the javadoc <code> tag in\n - S8017326: Cleanup of the javadoc <code> tag in\n - S8019772: Fix doclint issues in javax.crypto and\n - S8020688: Broken links in documentation at\n - S8021108: Clean up doclint warnings and errors in java.text\n - S8022120: JCK test\n api/javax_xml/crypto/dsig/TransformService/index_ParamMethods\n - S8025409: Fix javadoc comments errors and warning reported by\n - S8026021: more fix of javadoc errors and warnings reported by\n - S8037099: [macosx] Remove all references to GC from native\n - S8038184: XMLSignature throws StringIndexOutOfBoundsException\n - S8038349: Signing XML with DSA throws Exception when key is\n - S8049244: XML Signature performance issue caused by\n - S8050893: (smartcardio) Invert reset argument in tests in\n - S8059212: Modify sun/security/smartcardio manual regression\n - S8068279: (typo in the spec)\n - S8068491: Update the protocol for references of\n - S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs\n - S8076369: Introduce the jdk.tls.client.protocols system\n - S8139565: Restrict certificates with DSA keys less than 1024\n - S8140422: Add mechanism to allow non default root CAs to be\n - S8140587: Atomic*FieldUpdaters should use Class.isInstance\n - S8149029: Secure validation of XML based digital signature\n - S8151893: Add security property to configure XML Signature\n - S8161228: URL objects with custom protocol handlers have port\n - S8163304: jarsigner -verbose -verify should print the\n - S8164908: ReflectionFactory support for IIOP and custom\n - S8165230: RMIConnection addNotificationListeners failing with\n - S8166393: disabledAlgorithms property should not be strictly\n - S8166591: [macos 10.12] Trackpad scrolling of text on OS X\n - S8166739: Improve extensibility of ObjectInputFilter\n - S8167356: Follow up fix for jdk8 backport of 8164143. Changes\n - S8167459: Add debug output for indicating if a chosen\n - S8168861: AnchorCertificates uses hardcoded password for\n - S8169688: Backout (remove) MD5 from\n - S8169911: Enhanced tests for jarsigner -verbose -verify after\n - S8170131: Certificates not being blocked by\n - S8173854: [TEST] Update DHEKeySizing test case following\n - S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on\n - S8000351, PR3316, RH1390708: Tenuring threshold should be\n - S8153711, PR3315, RH1284948: [REDO] JDWP: Memory Leak:\n - S8170888, PR3316, RH1390708: [linux] Experimental support for\n - PR3318: Replace 'infinality' with 'improved font rendering'\n - PR3324: Fix NSS_LIBDIR substitution in\n - S8165673, PR3320: AArch64: Fix JNI floating point argument\n + S6604109, PR3162:\n - Add -fno-delete-null-pointer-checks -fno-lifetime-dse to try to\n directory to be specified versions of IcedTea\n\n", "modified": "2017-05-24T21:12:03", "published": "2017-05-24T21:12:03", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html", "id": "SUSE-SU-2017:1400-1", "title": "Security update for java-1_7_0-openjdk (important)", "type": "suse", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-05-30T18:45:09", "bulletinFamily": "unix", "description": "This update for java-1_8_0-openjdk fixes the following issues:\n\n - Upgrade to version jdk8u131 (icedtea 3.4.0) - bsc#1034849\n * Security fixes\n - S8163520, CVE-2017-3509: Reuse cache entries\n - S8163528, CVE-2017-3511: Better library loading\n - S8165626, CVE-2017-3512: Improved window framing\n - S8167110, CVE-2017-3514: Windows peering issue\n - S8168699: Validate special case invocations\n - S8169011, CVE-2017-3526: Resizing XML parse trees\n - S8170222, CVE-2017-3533: Better transfers of files\n - S8171121, CVE-2017-3539: Enhancing jar checking\n - S8171533, CVE-2017-3544: Better email transfer\n - S8172299: Improve class processing\n * New features\n - PR1969: Add AArch32 JIT port\n - PR3297: Allow Shenandoah to be used on AArch64\n - PR3340: jstack.stp should support AArch64\n * Import of OpenJDK 8 u131 build 11\n - S6474807: (smartcardio) CardTerminal.connect() throws CardException\n instead of CardNotPresentException\n - S6515172, PR3346: Runtime.availableProcessors() ignores Linux\n taskset command\n - S7155957: closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java\n hangs on win 64 bit with jdk8\n - S7167293: FtpURLConnection connection leak on FileNotFoundException\n - S8035568: [macosx] Cursor management unification\n - S8079595: Resizing dialog which is JWindow parent makes JVM crash\n - S8130769: The new menu can't be shown on the menubar after clicking\n the "Add" button.\n - S8146602: jdk/test/sun/misc/URLClassPath/ClassnameCharTest.java test\n fails with NullPointerException\n - S8147842: IME Composition Window is displayed at incorrect location\n - S8147910, PR3346: Cache initial active_processor_count\n - S8150490: Update OS detection code to recognize Windows Server 2016\n - S8160951: [TEST_BUG]\n javax/xml/bind/marshal/8134111/UnmarshalTest.java should be added\n into :needs_jre group\n - S8160958: [TEST_BUG]\n java/net/SetFactoryPermission/SetFactoryPermission.java should be\n added into :needs_compact2 group\n - S8161147: jvm crashes when -XX:+UseCountedLoopSafepoints is enabled\n - S8161195: Regression:\n closed/javax/swing/text/FlowView/LayoutTest.java\n - S8161993, PR3346: G1 crashes if active_processor_count changes\n during startup\n - S8162876: [TEST_BUG] sun/net/www/protocol/http/HttpInputStream.java\n fails intermittently\n - S8162916: Test sun/security/krb5/auto/UnboundSSL.java fails\n - S8164533: sun/security/ssl/SSLSocketImpl/CloseSocket.java failed\n with "Error while cleaning up threads after test"\n - S8167179: Make XSL generated namespace prefixes local to\n transformation process\n - S8168774: Polymorhic signature method check crashes javac\n - S8169465: Deadlock in com.sun.jndi.ldap.pool.Connections\n - S8169589: [macosx] Activating a JDialog puts to back another dialog\n - S8170307: Stack size option -Xss is ignored\n - S8170316: (tz) Support tzdata2016j\n - S8170814: Reuse cache entries (part II)\n - S8170888, PR3314, RH1284948: [linux] Experimental support for cgroup\n memory limits in container (ie Docker) environments\n - S8171388: Update JNDI Thread contexts\n - S8171949: [macosx] AWT_ZoomFrame Automated tests fail with error:\n The bitwise mask Frame.ICONIFIED is not setwhen the frame is in\n ICONIFIED state\n - S8171952: [macosx]\n AWT_Modality/Automated/ModalExclusion/NoExclusion/ModelessDialog\n test fails as DummyButton on Dialog did not gain focus when clicked.\n - S8173030: Temporary backout fix #8035568 from 8u131-b03\n - S8173031: Temporary backout fix #8171952 from 8u131-b03\n - S8173783, PR3328: IllegalArgumentException: jdk.tls.namedGroups\n - S8173931: 8u131 L10n resource file update\n - S8174844: Incorrect GPL header causes RE script to miss swap to\n commercial header for licensee source bundle\n - S8174985: NTLM authentication doesn't work with IIS if NTLM cache is\n disabled\n - S8176044: (tz) Support tzdata2017a\n * Backports\n - S6457406, PR3335: javadoc doesn't handle <a href='http://...'>\n properly in producing index pages\n - S8030245, PR3335: Update langtools to use try-with-resources and\n multi-catch\n - S8030253, PR3335: Update langtools to use strings-in-switch\n - S8030262, PR3335: Update langtools to use foreach loops\n - S8031113, PR3337: TEST_BUG:\n java/nio/channels/AsynchronousChannelGroup/Basic.java fails\n intermittently\n - S8031625, PR3335: javadoc problems referencing inner class\n constructors\n - S8031649, PR3335: Clean up javadoc tests\n - S8031670, PR3335: Remove unneeded -source options in javadoc tests\n - S8032066, PR3335: Serialized form has broken links to non private\n inner classes of package private\n - S8034174, PR2290: Remove use of JVM_* functions from java.net code\n - S8034182, PR2290: Misc. warnings in java.net code\n - S8035876, PR2290: AIX build issues after '8034174: Remove use\n of JVM_* functions from java.net code'\n - S8038730, PR3335: Clean up the way JavadocTester is invoked, and\n checks for errors.\n - S8040903, PR3335: Clean up use of BUG_ID in javadoc tests\n - S8040904, PR3335: Ensure javadoc tests do not overwrite results\n within tests\n - S8040908, PR3335: javadoc test TestDocEncoding should use\n -notimestamp\n - S8041150, PR3335: Avoid silly use of static methods in JavadocTester\n - S8041253, PR3335: Avoid redundant synonyms of NO_TEST\n - S8043780, PR3368: Use open(O_CLOEXEC) instead of fcntl(FD_CLOEXEC)\n - S8061305, PR3335: Javadoc crashes when method name ends with\n "Property"\n - S8072452, PR3337: Support DHE sizes up to 8192-bits and DSA sizes up\n to 3072-bits\n - S8075565, PR3337: Define @intermittent jtreg keyword and mark\n intermittently failing jdk tests\n - S8075670, PR3337: Remove intermittent keyword from some tests\n - S8078334, PR3337: Mark regression tests using randomness\n - S8078880, PR3337: Mark a few more intermittently failuring\n security-libs\n - S8133318, PR3337: Exclude intermittent failing PKCS11 tests\n on Solaris SPARC 11.1 and earlier\n - S8144539, PR3337: Update PKCS11 tests to run with security manager\n - S8144566, PR3352: Custom HostnameVerifier disables SNI extension\n - S8153711, PR3313, RH1284948: [REDO] JDWP: Memory Leak: GlobalRefs\n never deleted when processing invokeMethod command\n - S8155049, PR3352: New tests from 8144566 fail with "No expected\n Server Name Indication"\n - S8173941, PR3326: SA does not work if executable is DSO\n - S8174164, PR3334, RH1417266: SafePointNode::_replaced_nodes breaks\n with irreducible loops\n - S8174729, PR3336, RH1420518: Race Condition in\n java.lang.reflect.WeakCache\n - S8175097, PR3334, RH1417266: [TESTBUG] 8174164 fix missed the test\n * Bug fixes\n - PR3348: Architectures unsupported by SystemTap tapsets throw a parse\n error\n - PR3378: Perl should be mandatory\n - PR3389: javac.in and javah.in should use @PERL@ rather than a\n hardcoded path\n * AArch64 port\n - S8168699, PR3372: Validate special case invocations [AArch64 support]\n - S8170100, PR3372: AArch64: Crash in C1-compiled code accessing\n References\n - S8172881, PR3372: AArch64: assertion failure: the int pressure is\n incorrect\n - S8173472, PR3372: AArch64: C1 comparisons with null only use 32-bit\n instructions\n - S8177661, PR3372: Correct ad rule output register types from iRegX\n to iRegXNoSp\n * AArch32 port\n - PR3380: Zero should not be enabled by default on arm with the\n AArch32 HotSpot build\n - PR3384, S8139303, S8167584: Add support for AArch32 architecture to\n configure and jdk makefiles\n - PR3385: aarch32 does not support -Xshare:dump\n - PR3386, S8164652: AArch32 jvm.cfg wrong for C1 build\n - PR3387: Installation fails on arm with AArch32 port as\n INSTALL_ARCH_DIR is arm, not aarch32\n - PR3388: Wrong path for jvm.cfg being used on arm with AArch32 build\n * Shenandoah\n - Fix Shenandoah argument checking on 32bit builds.\n - Import from Shenandoah tag\n aarch64-shenandoah-jdk8u101-b14-shenandoah-merge-2016-07-25\n - Import from Shenandoah tag\n aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-02-20\n - Import from Shenandoah tag\n aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-06\n - Import from Shenandoah tag\n aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-09\n - Import from Shenandoah tag\n aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-23\n\n", "modified": "2017-05-30T18:15:32", "published": "2017-05-30T18:15:32", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html", "id": "SUSE-SU-2017:1445-1", "title": "Security update for java-1_8_0-openjdk (important)", "type": "suse", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "aix": [{"lastseen": "2018-08-31T00:08:37", "bulletinFamily": "unix", "description": "IBM SECURITY ADVISORY\n\nFirst Issued:Wed Jun 21 15:44:57 CDT 2017\n\nThe most recent version of this document is available here:\n\nhttp://aix.software.ibm.com/aix/efixes/security/java_apr2017_advisory.asc\nhttps://aix.software.ibm.com/aix/efixes/security/java_apr2017_advisory.asc\nftp://aix.software.ibm.com/aix/efixes/security/java_apr2017_advisory.asc\n\nSecurity Bulletin: Multiple vulnerabilities in IBM Java SDK affect AIX\nCVE-2017-3514 CVE-2017-3512 CVE-2017-3511 CVE-2017-3509 CVE-2017-3544 \nCVE-2017-3533 CVE-2017-3539 CVE-2017-1289 CVE-2016-9840 CVE-2016-9841 \nCVE-2016-9842 CVE-2016-9843\n===============================================================================\n\nSUMMARY:\n\n There are multiple vulnerabilities in IBM SDK Java Technology Edition,\n Versions 6, 7, 7.1, 8 that are used by AIX. These issues were disclosed\n as part of the IBM Java SDK updates in January 2017.\n\n===============================================================================\n\nVULNERABILITY DETAILS:\n\nCVEID: CVE-2017-3514\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3514\nDESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java \nSE AWT component could allow an unauthenticated attacker to take control of the \nsystem.\nCVSS Base Score: 8.3\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/124893\nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\nCVEID: CVE-2017-3512\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3512\nDESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the \nJava SE AWT component could allow an unauthenticated attacker to take control \nof the system.\nCVSS Base Score: 8.3\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/124891 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\nCVEID: CVE-2017-3511\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511\nDESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, \nJava SE Embedded, JRockit JCE component could allow an unauthenticated attacker to \ntake control of the system.\nCVSS Base Score: 7.7\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/124890 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\nCVEID: CVE-2017-3509\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509\nDESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, \nJava SE Embedded Networking component could allow an unauthenticated attacker to \ncause low confidentiality impact, low integrity impact, and no availability impact.\nCVSS Base Score: 4.2\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/124888 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)\n\nCVEID: CVE-2017-3544\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544\nDESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, \nJava SE Embedded, JRockit Networking component could allow an unauthenticated \nattacker to cause no confidentiality impact, low integrity impact, and no availability \nimpact.\nCVSS Base Score: 3.7\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/124920 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\nCVEID: CVE-2017-3533\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533\nDESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, \nJava SE Embedded, JRockit Networking component could allow an unauthenticated \nattacker to cause no confidentiality impact, low integrity impact, and no availability \nimpact.\nCVSS Base Score: 3.7\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/124910 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\nCVEID: CVE-2017-3539\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539\nDESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, \nJava SE Embedded Security component could allow an unauthenticated attacker to cause \nno confidentiality impact, low integrity impact, and no availability impact.\nCVSS Base Score: 3.1\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/124915 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\nCVEID: CVE-2017-1289\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1289\nDESCRIPTION: IBM SDK, Java Technology Edition is vulnerable XML External Entity Injection \n(XXE) error when processing XML data. A remote attacker could exploit this vulnerability to \nexpose highly sensitive information or consume memory resources.\nCVSS Base Score: 8.2\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/125150 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L)\n\nCVEID: CVE-2016-9840\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840\nDESCRIPTION: zlib is vulnerable to a denial of service, caused by an out-of-bounds pointer \narithmetic in inftrees.c. By persuading a victim to open a specially crafted document, a \nremote attacker could exploit this vulnerability to cause a denial of service.\nCVSS Base Score: 3.3\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120508 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)\n\nCVEID: CVE-2016-9841\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841\nDESCRIPTION: zlib is vulnerable to a denial of service, caused by an out-of-bounds pointer \narithmetic in inftrees.c. By persuading a victim to open a specially crafted document, a \nremote attacker could exploit this vulnerability to cause a denial of service.\nCVSS Base Score: 3.3\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120509 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)\n\nCVEID: CVE-2016-9842\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842\nDESCRIPTION: zlib is vulnerable to a denial of service, caused by an undefined left shift \nof negative number. By persuading a victim to open a specially crafted document, a remote \nattacker could exploit this vulnerability to cause a denial of service.\nCVSS Base Score: 3.3\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120510 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)\n\nCVEID: CVE-2016-9843\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843\nDESCRIPTION: zlib is vulnerable to a denial of service, caused by a big-endian out-of-bounds \npointer. By persuading a victim to open a specially crafted document, a remote attacker \ncould exploit this vulnerability to cause a denial of service.\nCVSS Base Score: 3.3\nCVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120511 \nfor the current score\nCVSS Environmental Score*: Undefined\nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)\n\n\nAFFECTED PRODUCTS AND VERSIONS:\n\n AIX 5.3, 6.1, 7.1, 7.2\n VIOS 2.2.x\n\n The following fileset levels (VRMF) are vulnerable, if the \n respective Java version is installed:\n For Java6: Less than 6.0.0.645 \n For Java7: Less than 7.0.0.605\n For Java7.1: Less than 7.1.0.405\n For Java8: Less than 8.0.0.406\n\n Note: To find out whether the affected Java filesets are installed \n on your systems, refer to the lslpp command found in AIX user's guide.\n\n Example: lslpp -L | grep -i java\n\nREMEDIATION:\n\n IBM SDK, Java Technology Edition, Version 6 Service Refresh 16 Fix \n Pack 45 and subsequent releases:\n 32-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=6.0.0.0&platform=AIX+32-bit,+pSeries&function=all\n 64-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=6.0.0.0&platform=AIX+64-bit,+pSeries&function=all\n\n IBM SDK, Java Technology Edition, Version 7 Service Refresh 10 Fix\n Pack 5 and subsequent releases:\n 32-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.0.0.0&platform=AIX+32-bit,+pSeries&function=all \n 64-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.0.0.0&platform=AIX+64-bit,+pSeries&function=all\n\n IBM SDK, Java Technology Edition, Version 7R1 Service Refresh 4\n Fix Pack 5 and subsequent releases:\n 32-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.1.0.0&platform=AIX+32-bit,+pSeries&function=all\n 64-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.1.0.0&platform=AIX+64-bit,+pSeries&function=all\n\n IBM SDK, Java Technology Edition, Version 8 Service Refresh 4\n Fix Pack 6 and subsequent releases:\n 32-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&platform=AIX+32-bit,+pSeries&function=all \n 64-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&platform=AIX+64-bit,+pSeries&function=all\n\nWORKAROUNDS AND MITIGATIONS:\n\n None.\n===============================================================================\n\nCONTACT US:\n\n If you would like to receive AIX Security Advisories via email,\n please visit \"My Notifications\":\n\n http://www.ibm.com/support/mynotifications\n\n To view previously issued advisories, please visit:\n\n http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq\n \n Contact IBM Support for questions related to this announcement:\n\n http://ibm.com/support/\n https://ibm.com/support/\n\n To obtain the OpenSSL public key that can be used to verify the\n signed advisories and ifixes:\n\n Download the key from our web page:\n\n http://www.ibm.com/systems/resources/systems_p_os_aix_security_pubkey.txt\n\n Please contact your local IBM AIX support center for any\n assistance.\n\n\nREFERENCES:\n \n Complete CVSS v2 Guide:\n http://www.first.org/cvss/v2/guide \n On-line Calculator v2:\n http://nvd.nist.gov/CVSS-v2-Calculator \n Complete CVSS v3 Guide:\n http://www.first.org/cvss/user-guide \n On-line Calculator v3:\n http://www.first.org/cvss/calculator/3.0 \n IBM Java SDK Security Bulletin:\n http://www-01.ibm.com/support/docview.wss?uid=swg21985393\n\n\nACKNOWLEDGEMENTS:\n\n None.\n\nCHANGE HISTORY:\n\n First Issued: Wed Jun 21 15:44:57 CDT 2017\n \n===============================================================================\n\n*The CVSS Environment Score is customer environment specific and will \nultimately impact the Overall CVSS Score. Customers can evaluate the impact \nof this vulnerability in their environments by accessing the links in the \nReference section of this Security Bulletin. \n\nDisclaimer\nAccording to the Forum of Incident Response and Security Teams (FIRST), the \nCommon Vulnerability Scoring System (CVSS) is an \"industry open standard \ndesigned to convey vulnerability severity and help to determine urgency and \npriority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY \nOF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS \nFOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT \nOF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n\n", "modified": "2017-06-21T15:44:57", "published": "2017-06-21T15:44:57", "id": "JAVA_APR2017_ADVISORY.ASC", "href": "https://aix.software.ibm.com/aix/efixes/security/java_apr2017_advisory.asc", "title": "There are multiple vulnerabilities in IBM SDK Java Technology Edition", "type": "aix", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "cve": [{"lastseen": "2018-11-01T05:15:40", "bulletinFamily": "NVD", "description": "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.", "modified": "2018-10-30T12:27:37", "published": "2017-05-23T00:29:01", "id": "CVE-2016-9842", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9842", "title": "CVE-2016-9842", "type": "cve", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-11-01T05:15:40", "bulletinFamily": "NVD", "description": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", "modified": "2018-10-30T12:27:37", "published": "2017-05-23T00:29:01", "id": "CVE-2016-9840", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9840", "title": "CVE-2016-9840", "type": "cve", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-11-01T05:15:40", "bulletinFamily": "NVD", "description": "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", "modified": "2018-10-30T12:27:37", "published": "2017-05-23T00:29:01", "id": "CVE-2016-9841", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9841", "title": "CVE-2016-9841", "type": "cve", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-11-01T05:15:40", "bulletinFamily": "NVD", "description": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", "modified": "2018-10-30T12:27:37", "published": "2017-05-23T00:29:01", "id": "CVE-2016-9843", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9843", "title": "CVE-2016-9843", "type": "cve", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-05T11:52:46", "bulletinFamily": "NVD", "description": "IBM SDK, Java Technology Edition is vulnerable XML External Entity Injection (XXE) error when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume memory resources. IBM X-Force ID: 125150.", "modified": "2018-01-04T21:31:29", "published": "2017-05-22T16:29:00", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1289", "id": "CVE-2017-1289", "title": "CVE-2017-1289", "type": "cve", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-05T11:53:02", "bulletinFamily": "NVD", "description": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "modified": "2018-01-04T21:31:38", "published": "2017-04-24T15:59:03", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3533", "id": "CVE-2017-3533", "type": "cve", "title": "CVE-2017-3533", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-01-05T11:53:02", "bulletinFamily": "NVD", "description": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "modified": "2018-01-04T21:31:38", "published": "2017-04-24T15:59:03", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3509", "id": "CVE-2017-3509", "type": "cve", "title": "CVE-2017-3509", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-01-05T11:53:02", "bulletinFamily": "NVD", "description": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "modified": "2018-01-04T21:31:38", "published": "2017-04-24T15:59:04", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3539", "id": "CVE-2017-3539", "type": "cve", "title": "CVE-2017-3539", "cvss": {"score": 2.1, "vector": "AV:NETWORK/AC:HIGH/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-01-05T11:53:02", "bulletinFamily": "NVD", "description": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "modified": "2018-01-04T21:31:38", "published": "2017-04-24T15:59:04", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3544", "id": "CVE-2017-3544", "type": "cve", "title": "CVE-2017-3544", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-01-05T11:53:02", "bulletinFamily": "NVD", "description": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "modified": "2018-01-04T21:31:38", "published": "2017-04-24T15:59:03", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3511", "id": "CVE-2017-3511", "type": "cve", "title": "CVE-2017-3511", "cvss": {"score": 3.7, "vector": "AV:LOCAL/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "gentoo": [{"lastseen": "2017-01-23T04:59:34", "bulletinFamily": "unix", "description": "### Background\n\nzlib is a widely used free and patent unencumbered data compression library. \n\n### Description\n\nMultiple vulnerabilities have been discovered in zlib. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nAn attacker could cause a Denial of Service condition.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll zlib users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=sys-libs/zlib-1.2.9\"", "modified": "2017-01-23T00:00:00", "published": "2017-01-23T00:00:00", "href": "https://security.gentoo.org/glsa/201701-56", "id": "GLSA-201701-56", "type": "gentoo", "title": "zlib: Multiple vulnerabilities", "cvss": {"score": 0.0, "vector": "NONE"}}], "oraclelinux": [{"lastseen": "2018-08-31T01:46:50", "bulletinFamily": "unix", "description": "[1:1.7.0.141-2.6.10.1.0.1]\n- Update DISTRO_NAME in specfile\n[1:1.7.0.141-2.6.10.1]\n- Bump to u141b02 to include S8011123 fix for TCK failure.\n- Resolves: rhbz#1438751\n[1:1.7.0.141-2.6.10.0]\n- Bump to 2.6.10 and u141b00.\n- Adjust RH1022017 following application of 8173783\n- Add more detailed output to fsg.sh and generate_source_tarball.sh.\n- Bump to u141b01 to include S8043723 fix for s390.\n- Resolves: rhbz#1438751", "modified": "2017-05-09T00:00:00", "published": "2017-05-09T00:00:00", "id": "ELSA-2017-1204", "href": "http://linux.oracle.com/errata/ELSA-2017-1204.html", "title": "java-1.7.0-openjdk security update", "type": "oraclelinux", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T01:49:00", "bulletinFamily": "unix", "description": "[1:1.8.0.131-0.b11]\n- Update to aarch64-jdk8u131-b11.\n- Drop upstreamed patches for 8147910, 8161993, 8170888 and 8173783.\n- Update generate_source_tarball.sh to remove patch remnants.\n- Cleanup tarball creation documentation to avoid duplication.\n- Resolves: rhbz#1438751\n[1:1.8.0.121-2.b13]\n- Add backports from 8u131 and 8u152 ahead of April CPU.\n- Apply backports before local RPM fixes so they will be the same as when applied upstream\n- Adjust RH1022017 following application of 8173783\n- Resolves: rhbz#1438751", "modified": "2017-04-20T00:00:00", "published": "2017-04-20T00:00:00", "id": "ELSA-2017-1109", "href": "http://linux.oracle.com/errata/ELSA-2017-1109.html", "title": "java-1.8.0-openjdk security update", "type": "oraclelinux", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T01:37:48", "bulletinFamily": "unix", "description": "[1:1.8.0.131-2.b13]\n- Backport 'S8153711: [REDO] JDWP: Memory Leak: GlobalRefs never deleted when processing invokeMethod command'\n- Resolves: rhbz#1442162\n[1:1.8.0.131-1.b11]\n- Update to aarch64-jdk8u131-b11.\n- Drop upstreamed patches for 8147910, 8161993, 8170888 and 8173783.\n- Update generate_source_tarball.sh to remove patch remnants.\n- Cleanup tarball creation documentation to avoid duplication.\n- Add MD5 checksum for the new java.security file (MD5 disabled for JAR signing)\n- Resolves: rhbz#1438751\n[1:1.8.0.121-1.b13]\n- Add backports from 8u131 and 8u152 ahead of April CPU.\n- Apply backports before local RPM fixes so they will be the same as when applied upstream\n- Adjust RH1022017 following application of 8173783\n- Resolves: rhbz#1438751", "modified": "2017-04-20T00:00:00", "published": "2017-04-20T00:00:00", "id": "ELSA-2017-1108", "href": "http://linux.oracle.com/errata/ELSA-2017-1108.html", "title": "java-1.8.0-openjdk security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2018-11-19T12:57:04", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-16T00:00:00", "published": "2017-05-17T00:00:00", "id": "OPENVAS:1361412562310843173", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843173", "title": "Ubuntu Update for openjdk-7 USN-3275-2", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for openjdk-7 USN-3275-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843173\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-05-17 06:54:55 +0200 (Wed, 17 May 2017)\");\n script_cve_id(\"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3526\", \"CVE-2017-3533\",\n \"CVE-2017-3539\", \"CVE-2017-3544\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for openjdk-7 USN-3275-2\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openjdk-7'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"USN-3275-1 fixed vulnerabilities in OpenJDK\n 8. This update provides the corresponding updates for OpenJDK 7. Original\n advisory details: It was discovered that OpenJDK improperly re-used cached NTLM\n connections in some situations. A remote attacker could possibly use this to\n cause a Java application to perform actions with the credentials of a different\n user. (CVE-2017-3509) It was discovered that an untrusted library search path\n flaw existed in the Java Cryptography Extension (JCE) component of OpenJDK. A\n local attacker could possibly use this to gain the privileges of a Java\n application. (CVE-2017-3511) It was discovered that the Java API for XML\n Processing (JAXP) component in OpenJDK did not properly enforce size limits when\n parsing XML documents. An attacker could use this to cause a denial of service\n (processor and memory consumption). (CVE-2017-3526) It was discovered that the\n FTP client implementation in OpenJDK did not properly sanitize user inputs. If a\n user was tricked into opening a specially crafted FTP URL, a remote attacker\n could use this to manipulate the FTP connection. (CVE-2017-3533) It was\n discovered that OpenJDK allowed MD5 to be used as an algorithm for JAR integrity\n verification. An attacker could possibly use this to modify the contents of a\n JAR file without detection. (CVE-2017-3539) It was discovered that the SMTP\n client implementation in OpenJDK did not properly sanitize sender and recipient\n addresses. A remote attacker could use this to specially craft email addresses\n and gain control of a Java application's SMTP connections. (CVE-2017-3544)\");\n script_tag(name:\"affected\", value:\"openjdk-7 on Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3275-2\");\n script_xref(name:\"URL\", value:\"https://www.ubuntu.com/usn/usn-3275-2\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.04 LTS\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"icedtea-7-jre-jamvm:amd64\", ver:\"7u131-2.6.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"icedtea-7-jre-jamvm:i386\", ver:\"7u131-2.6.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre:amd64\", ver:\"7u131-2.6.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre:i386\", ver:\"7u131-2.6.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre-headless:amd64\", ver:\"7u131-2.6.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre-headless:i386\", ver:\"7u131-2.6.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre-lib\", ver:\"7u131-2.6.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre-zero:amd64\", ver:\"7u131-2.6.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre-zero:i386\", ver:\"7u131-2.6.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:57:51", "bulletinFamily": "scanner", "description": "Several vulnerabilities have been discovered in OpenJDK, an\nimplementation of the Oracle Java platform, resulting in privilege\nescalation, denial of service, newline injection in SMTP or use of\ninsecure cryptography.", "modified": "2017-07-07T00:00:00", "published": "2017-05-19T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=703858", "id": "OPENVAS:703858", "title": "Debian Security Advisory DSA 3858-1 (openjdk-7 - security update)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3858.nasl 6607 2017-07-07 12:04:25Z cfischer $\n# Auto-generated from advisory DSA 3858-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703858);\n script_version(\"$Revision: 6607 $\");\n script_cve_id(\"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3526\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n script_name(\"Debian Security Advisory DSA 3858-1 (openjdk-7 - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:04:25 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2017-05-19 00:00:00 +0200 (Fri, 19 May 2017)\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2017/dsa-3858.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"openjdk-7 on Debian Linux\");\n script_tag(name: \"insight\", value: \"OpenJDK is a development environment for building applications,\napplets, and components using the Java programming language.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), these problems have been fixed in\nversion 7u131-2.6.9-2~deb8u1.\n\nWe recommend that you upgrade your openjdk-7 packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities have been discovered in OpenJDK, an\nimplementation of the Oracle Java platform, resulting in privilege\nescalation, denial of service, newline injection in SMTP or use of\ninsecure cryptography.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"icedtea-7-jre-jamvm\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-dbg\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-demo\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-doc\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jdk\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre-headless\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre-lib\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre-zero\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-source\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-11-19T12:56:45", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-16T00:00:00", "published": "2017-05-12T00:00:00", "id": "OPENVAS:1361412562310843158", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843158", "title": "Ubuntu Update for openjdk-8 USN-3275-1", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for openjdk-8 USN-3275-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843158\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-05-12 06:50:23 +0200 (Fri, 12 May 2017)\");\n script_cve_id(\"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3526\", \"CVE-2017-3533\",\n \"CVE-2017-3539\", \"CVE-2017-3544\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for openjdk-8 USN-3275-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openjdk-8'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"It was discovered that OpenJDK improperly\n re-used cached NTLM connections in some situations. A remote attacker could\n possibly use this to cause a Java application to perform actions with the\n credentials of a different user. (CVE-2017-3509) It was discovered that an\n untrusted library search path flaw existed in the Java Cryptography Extension\n (JCE) component of OpenJDK. A local attacker could possibly use this to gain the\n privileges of a Java application. (CVE-2017-3511) It was discovered that the\n Java API for XML Processing (JAXP) component in OpenJDK did not properly enforce\n size limits when parsing XML documents. An attacker could use this to cause a\n denial of service (processor and memory consumption). (CVE-2017-3526) It was\n discovered that the FTP client implementation in OpenJDK did not properly\n sanitize user inputs. If a user was tricked into opening a specially crafted FTP\n URL, a remote attacker could use this to manipulate the FTP connection.\n (CVE-2017-3533) It was discovered that OpenJDK allowed MD5 to be used as an\n algorithm for JAR integrity verification. An attacker could possibly use this to\n modify the contents of a JAR file without detection. (CVE-2017-3539) It was\n discovered that the SMTP client implementation in OpenJDK did not properly\n sanitize sender and recipient addresses. A remote attacker could use this to\n specially craft email addresses and gain control of a Java application's SMTP\n connections. (CVE-2017-3544)\");\n script_tag(name:\"affected\", value:\"openjdk-8 on Ubuntu 17.04,\n Ubuntu 16.10,\n Ubuntu 16.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3275-1\");\n script_xref(name:\"URL\", value:\"https://www.ubuntu.com/usn/usn-3275-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(17\\.04|16\\.10|16\\.04 LTS)\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU17.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre:amd64\", ver:\"8u131-b11-0ubuntu1.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre:i386\", ver:\"8u131-b11-0ubuntu1.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-headless:amd64\", ver:\"8u131-b11-0ubuntu1.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-headless:i386\", ver:\"8u131-b11-0ubuntu1.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-zero:amd64\", ver:\"8u131-b11-0ubuntu1.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-zero:i386\", ver:\"8u131-b11-0ubuntu1.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre:amd64\", ver:\"8u131-b11-0ubuntu1.16.10.2\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre:i386\", ver:\"8u131-b11-0ubuntu1.16.10.2\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-headless:amd64\", ver:\"8u131-b11-0ubuntu1.16.10.2\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-headless:i386\", ver:\"8u131-b11-0ubuntu1.16.10.2\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-jamvm:i386\", ver:\"8u131-b11-0ubuntu1.16.10.2\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-jamvm:amd64\", ver:\"8u131-b11-0ubuntu1.16.10.2\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-zero:amd64\", ver:\"8u131-b11-0ubuntu1.16.10.2\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-zero:i386\", ver:\"8u131-b11-0ubuntu1.16.10.2\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre:amd64\", ver:\"8u131-b11-0ubuntu1.16.04.2\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre:i386\", ver:\"8u131-b11-0ubuntu1.16.04.2\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-headless:amd64\", ver:\"8u131-b11-0ubuntu1.16.04.2\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-headless:i386\", ver:\"8u131-b11-0ubuntu1.16.04.2\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-jamvm:amd64\", ver:\"8u131-b11-0ubuntu1.16.04.2\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-jamvm:i386\", ver:\"8u131-b11-0ubuntu1.16.04.2\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-zero:amd64\", ver:\"8u131-b11-0ubuntu1.16.04.2\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-8-jre-zero:i386\", ver:\"8u131-b11-0ubuntu1.16.04.2\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-09-01T23:39:59", "bulletinFamily": "scanner", "description": "Several vulnerabilities have been discovered in OpenJDK, an\nimplementation of the Oracle Java platform, resulting in privilege\nescalation, denial of service, newline injection in SMTP or use of\ninsecure cryptography.", "modified": "2018-07-10T00:00:00", "published": "2018-01-25T00:00:00", "id": "OPENVAS:1361412562310890954", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310890954", "title": "Debian LTS Advisory ([SECURITY] [DLA 954-1] openjdk-7 security update)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: deb_dla_954.nasl 10474 2018-07-10 08:12:26Z cfischer $\n#\n# Auto-generated from advisory DLA 954-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.890954\");\n script_version(\"$Revision: 10474 $\");\n script_cve_id(\"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3526\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n script_name(\"Debian LTS Advisory ([SECURITY] [DLA 954-1] openjdk-7 security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-07-10 10:12:26 +0200 (Tue, 10 Jul 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-25 00:00:00 +0100 (Thu, 25 Jan 2018)\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2017/05/msg00025.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\\.[0-9]+\");\n script_tag(name:\"affected\", value:\"openjdk-7 on Debian Linux\");\n script_tag(name:\"insight\", value:\"OpenJDK is a development environment for building applications,\napplets, and components using the Java programming language.\");\n script_tag(name:\"solution\", value:\"For Debian 7 'Wheezy', these problems have been fixed in version\n7u131-2.6.9-2~deb7u1.\n\nWe recommend that you upgrade your openjdk-7 packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been discovered in OpenJDK, an\nimplementation of the Oracle Java platform, resulting in privilege\nescalation, denial of service, newline injection in SMTP or use of\ninsecure cryptography.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"icedtea-7-jre-cacao\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icedtea-7-jre-jamvm\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-dbg\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-demo\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-doc\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jdk\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre-headless\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre-lib\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre-zero\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-source\", ver:\"7u131-2.6.9-2~deb7u1\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-11-19T12:57:27", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-16T00:00:00", "published": "2017-05-19T00:00:00", "id": "OPENVAS:1361412562310843177", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843177", "title": "Ubuntu Update for openjdk-7 USN-3275-3", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for openjdk-7 USN-3275-3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843177\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-05-19 07:10:00 +0200 (Fri, 19 May 2017)\");\n script_cve_id(\"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3526\", \"CVE-2017-3533\",\n \"CVE-2017-3539\", \"CVE-2017-3544\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for openjdk-7 USN-3275-3\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openjdk-7'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"USN-3275-2 fixed vulnerabilities in OpenJDK\n7. Unfortunately, the update introduced a regression when handling TLS handshakes.\nThis update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that OpenJDK improperly re-used cached NTLM\nconnections in some situations. A remote attacker could possibly\nuse this to cause a Java application to perform actions with the\ncredentials of a different user. (CVE-2017-3509)\n\nIt was discovered that an untrusted library search path flaw existed\nin the Java Cryptography Extension (JCE) component of OpenJDK. A\nlocal attacker could possibly use this to gain the privileges of a\nJava application. (CVE-2017-3511)\n\nIt was discovered that the Java API for XML Processing (JAXP) component\nin OpenJDK did not properly enforce size limits when parsing XML\ndocuments. An attacker could use this to cause a denial of service\n(processor and memory consumption). (CVE-2017-3526)\n\nIt was discovered that the FTP client implementation in OpenJDK did\nnot properly sanitize user inputs. If a user was tricked into opening\na specially crafted FTP URL, a remote attacker could use this to\nmanipulate the FTP connection. (CVE-2017-3533)\n\nIt was discovered that OpenJDK allowed MD5 to be used as an algorithm\nfor JAR integrity verification. An attacker could possibly use this\nto modify the contents of a JAR file without detection. (CVE-2017-3539)\n\nIt was discovered that the SMTP client implementation in OpenJDK\ndid not properly sanitize sender and recipient addresses. A remote\nattacker could use this to specially craft email addresses and gain\ncontrol of a Java application's SMTP connections. (CVE-2017-3544)\");\n script_tag(name:\"affected\", value:\"openjdk-7 on Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3275-3\");\n script_xref(name:\"URL\", value:\"https://www.ubuntu.com/usn/usn-3275-3\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.04 LTS\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"icedtea-7-jre-jamvm:amd64\", ver:\"7u131-2.6.9-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"icedtea-7-jre-jamvm:i386\", ver:\"7u131-2.6.9-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre:amd64\", ver:\"7u131-2.6.9-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre:i386\", ver:\"7u131-2.6.9-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre-headless:amd64\", ver:\"7u131-2.6.9-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre-headless:i386\", ver:\"7u131-2.6.9-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre-lib\", ver:\"7u131-2.6.9-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre-zero:amd64\", ver:\"7u131-2.6.9-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openjdk-7-jre-zero:i386\", ver:\"7u131-2.6.9-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-09-01T23:42:50", "bulletinFamily": "scanner", "description": "Several vulnerabilities have been discovered in OpenJDK, an\nimplementation of the Oracle Java platform, resulting in privilege\nescalation, denial of service, newline injection in SMTP or use of\ninsecure cryptography.", "modified": "2018-04-06T00:00:00", "published": "2017-05-19T00:00:00", "id": "OPENVAS:1361412562310703858", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703858", "title": "Debian Security Advisory DSA 3858-1 (openjdk-7 - security update)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3858.nasl 9356 2018-04-06 07:17:02Z cfischer $\n# Auto-generated from advisory DSA 3858-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703858\");\n script_version(\"$Revision: 9356 $\");\n script_cve_id(\"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3526\", \"CVE-2017-3533\", \"CVE-2017-3539\", \"CVE-2017-3544\");\n script_name(\"Debian Security Advisory DSA 3858-1 (openjdk-7 - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2018-04-06 09:17:02 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name: \"creation_date\", value: \"2017-05-19 00:00:00 +0200 (Fri, 19 May 2017)\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2017/dsa-3858.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"openjdk-7 on Debian Linux\");\n script_tag(name: \"insight\", value: \"OpenJDK is a development environment for building applications,\napplets, and components using the Java programming language.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), these problems have been fixed in\nversion 7u131-2.6.9-2~deb8u1.\n\nWe recommend that you upgrade your openjdk-7 packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities have been discovered in OpenJDK, an\nimplementation of the Oracle Java platform, resulting in privilege\nescalation, denial of service, newline injection in SMTP or use of\ninsecure cryptography.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"icedtea-7-jre-jamvm\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-dbg\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-demo\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-doc\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jdk\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre-headless\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre-lib\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-jre-zero\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-7-source\", ver:\"7u131-2.6.9-2~deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-11-23T15:06:59", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2017-04-22T00:00:00", "id": "OPENVAS:1361412562310871808", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871808", "title": "RedHat Update for java-1.8.0-openjdk RHSA-2017:1109-01", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for java-1.8.0-openjdk RHSA-2017:1109-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871808\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-04-22 06:44:03 +0200 (Sat, 22 Apr 2017)\");\n script_cve_id(\"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3526\", \"CVE-2017-3533\",\n \"CVE-2017-3539\", \"CVE-2017-3544\", \"CVE-2016-5542\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"RedHat Update for java-1.8.0-openjdk RHSA-2017:1109-01\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'java-1.8.0-openjdk'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The java-1.8.0-openjdk packages provide\nthe OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software\nDevelopment Kit.\n\nSecurity Fix(es):\n\n * An untrusted library search path flaw was found in the JCE component of\nOpenJDK. A local attacker could possibly use this flaw to cause a Java\napplication using JCE to load an attacker-controlled library and hence\nescalate their privileges. (CVE-2017-3511)\n\n * It was found that the JAXP component of OpenJDK failed to correctly\nenforce parse tree size limits when parsing XML document. An attacker able\nto make a Java application parse a specially crafted XML document could use\nthis flaw to make it consume an excessive amount of CPU and memory.\n(CVE-2017-3526)\n\n * It was discovered that the HTTP client implementation in the Networking\ncomponent of OpenJDK could cache and re-use an NTLM authenticated\nconnection in a different security context. A remote attacker could\npossibly use this flaw to make a Java application perform HTTP requests\nauthenticated with credentials of a different user. (CVE-2017-3509)\n\nNote: This update adds support for the 'jdk.ntlm.cache' system property\nwhich, when set to false, prevents caching of NTLM connections and\nauthentications and hence prevents this issue. However, caching remains\nenabled by default.\n\n * It was discovered that the Security component of OpenJDK did not allow\nusers to restrict the set of algorithms allowed for Jar integrity\nverification. This flaw could allow an attacker to modify content of the\nJar file that used weak signing key or hash algorithm. (CVE-2017-3539)\n\nNote: This updates extends the fix for CVE-2016-5542 released as part of\nthe RHSA-2016:2079 erratum to no longer allow the MD5 hash algorithm during\nthe Jar integrity verification by adding it to the\njdk.jar.disabledAlgorithms security property.\n\n * Newline injection flaws were discovered in FTP and SMTP client\nimplementations in the Networking component in OpenJDK. A remote attacker\ncould possibly use these flaws to manipulate FTP or SMTP connections\nestablished by a Java application. (CVE-2017-3533, CVE-2017-3544)\n\nNote: If the web browser plug-in provided by the icedtea-web package was\ninstalled, the issues exposed via Java applets could have been exploited\nwithout user interaction if a user visited a malicious website.\");\n script_tag(name:\"affected\", value:\"java-1.8.0-openjdk on\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"RHSA\", value:\"2017:1109-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2017-April/msg00050.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk\", rpm:\"java-1.8.0-openjdk~1.8.0.131~0.b11.el6_9\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-debuginfo\", rpm:\"java-1.8.0-openjdk-debuginfo~1.8.0.131~0.b11.el6_9\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-devel\", rpm:\"java-1.8.0-openjdk-devel~1.8.0.131~0.b11.el6_9\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-headless\", rpm:\"java-1.8.0-openjdk-headless~1.8.0.131~0.b11.el6_9\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-11-19T12:57:46", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-16T00:00:00", "published": "2017-05-28T00:00:00", "id": "OPENVAS:1361412562310851560", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851560", "title": "SuSE Update for java-1_7_0-openjdk openSUSE-SU-2017:1429-1 (java-1_7_0-openjdk)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2017_1429_1.nasl 12381 2018-11-16 11:16:30Z cfischer $\n#\n# SuSE Update for java-1_7_0-openjdk openSUSE-SU-2017:1429-1 (java-1_7_0-openjdk)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851560\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-05-28 07:00:53 +0200 (Sun, 28 May 2017)\");\n script_cve_id(\"CVE-2017-3289\", \"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3512\",\n \"CVE-2017-3514\", \"CVE-2017-3526\", \"CVE-2017-3533\", \"CVE-2017-3539\",\n \"CVE-2017-3544\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SuSE Update for java-1_7_0-openjdk openSUSE-SU-2017:1429-1 (java-1_7_0-openjdk)\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'java-1_7_0-openjdk'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"This update for java-1_7_0-openjdk fixes\n the following issues: - Update to 2.6.10 - OpenJDK 7u141 (bsc#1034849) *\n Security fixes - S8163520, CVE-2017-3509: Reuse cache entries - S8163528,\n CVE-2017-3511: Better library loading - S8165626, CVE-2017-3512: Improved window\n framing - S8167110, CVE-2017-3514: Windows peering issue - S8169011,\n CVE-2017-3526: Resizing XML parse trees - S8170222, CVE-2017-3533: Better\n transfers of files - S8171121, CVE-2017-3539: Enhancing jar checking - S8171533,\n CVE-2017-3544: Better email transfer - S8172299: Improve class processing * New\n features - PR3347: jstack.stp should support AArch64 * Import of OpenJDK 7 u141\n build 0 - S4717864: setFont() does not update Fonts of Menus already on screen -\n S6474807: (smartcardio) CardTerminal.connect() throws CardException instead of\n CardNotPresentException - S6518907: cleanup IA64 specific code in Hotspot -\n S6869327: Add new C2 flag to keep safepoints in counted loops. - S7112912:\n Message 'Error occurred during initialization of VM' on boxes with lots of RAM -\n S7124213: [macosx] pack() does ignore size of a component doesn't on the other\n platforms - S7124219: [macosx] Unable to draw images to fullscreen - S7124552:\n [macosx] NullPointerException in getBufferStrategy() - S7148275: [macosx]\n setIconImages() not working correctly (distorted icon when minimized) -\n S7154841: [macosx] Popups appear behind taskbar - S7155957:\n closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java hangs on win 64 bit\n with jdk8 - S7160627: [macosx] TextArea has wrong initial size - S7167293:\n FtpURLConnection connection leak on FileNotFoundException - S7168851: [macosx]\n Netbeans crashes in CImage.nativeCreateNSImageFromArray - S7197203:\n sun/misc/URLClassPath/ClassnameCharTest.sh failed, compile error - S8005255:\n [macosx] Cleanup warnings in sun.lwawt - S8006088: Incompatible heap size flags\n accepted by VM - S8007295: Reduce number of warnings in awt classes - S8010722:\n assert: failed: heap size is too big for compressed oops - S8011059: [macosx]\n Support automatic @2x images loading on Mac OS X - S8014058: Regression tests\n for 8006088 - S8014489:\n tests/gc/arguments/Test(SerialCMSParallelG1)HeapSizeFlags jtreg tests invoke\n wrong class - S8016302: Change type of the number of GC workers to unsigned int\n (2) - S8024662: gc/arguments/TestUseCompressedOopsErgo.java does not compile. -\n S8024669: Native OOME when allocating after changes to maximum heap supporting\n Coops sizing on sparcv9 - S8024926: [macosx] AquaIcon HiDPI support ...\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"java-1_7_0-openjdk on openSUSE Leap 42.2\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2017:1429_1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap42\\.2\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\nres = \"\";\n\nif(release == \"openSUSELeap42.2\")\n{\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk\", rpm:\"java-1_7_0-openjdk~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-accessibility\", rpm:\"java-1_7_0-openjdk-accessibility~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-bootstrap\", rpm:\"java-1_7_0-openjdk-bootstrap~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-bootstrap-debuginfo\", rpm:\"java-1_7_0-openjdk-bootstrap-debuginfo~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-bootstrap-debugsource\", rpm:\"java-1_7_0-openjdk-bootstrap-debugsource~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-bootstrap-devel\", rpm:\"java-1_7_0-openjdk-bootstrap-devel~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-bootstrap-devel-debuginfo\", rpm:\"java-1_7_0-openjdk-bootstrap-devel-debuginfo~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-bootstrap-headless\", rpm:\"java-1_7_0-openjdk-bootstrap-headless~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-bootstrap-headless-debuginfo\", rpm:\"java-1_7_0-openjdk-bootstrap-headless-debuginfo~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-debuginfo\", rpm:\"java-1_7_0-openjdk-debuginfo~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-debugsource\", rpm:\"java-1_7_0-openjdk-debugsource~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-demo\", rpm:\"java-1_7_0-openjdk-demo~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-demo-debuginfo\", rpm:\"java-1_7_0-openjdk-demo-debuginfo~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-devel\", rpm:\"java-1_7_0-openjdk-devel~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-devel-debuginfo\", rpm:\"java-1_7_0-openjdk-devel-debuginfo~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-headless\", rpm:\"java-1_7_0-openjdk-headless~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-headless-debuginfo\", rpm:\"java-1_7_0-openjdk-headless-debuginfo~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-src\", rpm:\"java-1_7_0-openjdk-src~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1_7_0-openjdk-javadoc\", rpm:\"java-1_7_0-openjdk-javadoc~1.7.0.141~42.3.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-09-01T23:41:11", "bulletinFamily": "scanner", "description": "Check the version of java", "modified": "2017-07-10T00:00:00", "published": "2017-04-22T00:00:00", "id": "OPENVAS:1361412562310882705", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882705", "title": "CentOS Update for java CESA-2017:1109 centos6 ", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for java CESA-2017:1109 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882705\");\n script_version(\"$Revision: 6659 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:52:22 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2017-04-22 06:44:30 +0200 (Sat, 22 Apr 2017)\");\n script_cve_id(\"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3526\", \"CVE-2017-3533\", \n \"CVE-2017-3539\", \"CVE-2017-3544\", \"CVE-2016-5542\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for java CESA-2017:1109 centos6 \");\n script_tag(name: \"summary\", value: \"Check the version of java\");\n script_tag(name: \"vuldetect\", value: \"Get the installed version with the help \nof detect NVT and check if the version is vulnerable or not.\");\n script_tag(name: \"insight\", value: \"The java-1.8.0-openjdk packages provide the \nOpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An untrusted library search path flaw was found in the JCE component of\nOpenJDK. A local attacker could possibly use this flaw to cause a Java\napplication using JCE to load an attacker-controlled library and hence\nescalate their privileges. (CVE-2017-3511)\n\n* It was found that the JAXP component of OpenJDK failed to correctly\nenforce parse tree size limits when parsing XML document. An attacker able\nto make a Java application parse a specially crafted XML document could use\nthis flaw to make it consume an excessive amount of CPU and memory.\n(CVE-2017-3526)\n\n* It was discovered that the HTTP client implementation in the Networking\ncomponent of OpenJDK could cache and re-use an NTLM authenticated\nconnection in a different security context. A remote attacker could\npossibly use this flaw to make a Java application perform HTTP requests\nauthenticated with credentials of a different user. (CVE-2017-3509)\n\nNote: This update adds support for the 'jdk.ntlm.cache' system property\nwhich, when set to false, prevents caching of NTLM connections and\nauthentications and hence prevents this issue. However, caching remains\nenabled by default.\n\n* It was discovered that the Security component of OpenJDK did not allow\nusers to restrict the set of algorithms allowed for Jar integrity\nverification. This flaw could allow an attacker to modify content of the\nJar file that used weak signing key or hash algorithm. (CVE-2017-3539)\n\nNote: This updates extends the fix for CVE-2016-5542 released as part of\nthe RHSA-2016:2079 erratum to no longer allow the MD5 hash algorithm during\nthe Jar integrity verification by adding it to the\njdk.jar.disabledAlgorithms security property.\n\n* Newline injection flaws were discovered in FTP and SMTP client\nimplementations in the Networking component in OpenJDK. A remote attacker\ncould possibly use these flaws to manipulate FTP or SMTP connections\nestablished by a Java application. (CVE-2017-3533, CVE-2017-3544)\n\nNote: If the web browser plug-in provided by the icedtea-web package was\ninstalled, the issues exposed via Java applets could have been exploited\nwithout user interaction if a user visited a malicious website.\n\");\n script_tag(name: \"affected\", value: \"java on CentOS 6\");\n script_tag(name: \"solution\", value: \"Please Install the Updated Packages.\");\n\n script_xref(name: \"CESA\", value: \"2017:1109\");\n script_xref(name: \"URL\" , value: \"http://lists.centos.org/pipermail/centos-announce/2017-April/022395.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk\", rpm:\"java-1.8.0-openjdk~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-debug\", rpm:\"java-1.8.0-openjdk-debug~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-demo\", rpm:\"java-1.8.0-openjdk-demo~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-demo-debug\", rpm:\"java-1.8.0-openjdk-demo-debug~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-devel\", rpm:\"java-1.8.0-openjdk-devel~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-devel-debug\", rpm:\"java-1.8.0-openjdk-devel-debug~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-headless\", rpm:\"java-1.8.0-openjdk-headless~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-headless-debug\", rpm:\"java-1.8.0-openjdk-headless-debug~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-javadoc\", rpm:\"java-1.8.0-openjdk-javadoc~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-javadoc-debug\", rpm:\"java-1.8.0-openjdk-javadoc-debug~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-src\", rpm:\"java-1.8.0-openjdk-src~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-src~debug\", rpm:\"java-1.8.0-openjdk-src~debug~1.8.0.131~0.b11.el6_9\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-09-01T23:42:11", "bulletinFamily": "scanner", "description": "Check the version of java", "modified": "2017-07-10T00:00:00", "published": "2017-04-22T00:00:00", "id": "OPENVAS:1361412562310882706", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882706", "title": "CentOS Update for java CESA-2017:1108 centos7 ", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for java CESA-2017:1108 centos7 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882706\");\n script_version(\"$Revision: 6659 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:52:22 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2017-04-22 06:44:46 +0200 (Sat, 22 Apr 2017)\");\n script_cve_id(\"CVE-2017-3509\", \"CVE-2017-3511\", \"CVE-2017-3526\", \"CVE-2017-3533\", \n \"CVE-2017-3539\", \"CVE-2017-3544\", \"CVE-2016-5542\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for java CESA-2017:1108 centos7 \");\n script_tag(name: \"summary\", value: \"Check the version of java\");\n script_tag(name: \"vuldetect\", value: \"Get the installed version with the help \nof detect NVT and check if the version is vulnerable or not.\");\n script_tag(name: \"insight\", value: \"The java-1.8.0-openjdk packages provide the \nOpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An untrusted library search path flaw was found in the JCE component of\nOpenJDK. A local attacker could possibly use this flaw to cause a Java\napplication using JCE to load an attacker-controlled library and hence\nescalate their privileges. (CVE-2017-3511)\n\n* It was found that the JAXP component of OpenJDK failed to correctly\nenforce parse tree size limits when parsing XML document. An attacker able\nto make a Java application parse a specially crafted XML document could use\nthis flaw to make it consume an excessive amount of CPU and memory.\n(CVE-2017-3526)\n\n* It was discovered that the HTTP client implementation in the Networking\ncomponent of OpenJDK could cache and re-use an NTLM authenticated\nconnection in a different security context. A remote attacker could\npossibly use this flaw to make a Java application perform HTTP requests\nauthenticated with credentials of a different user. (CVE-2017-3509)\n\nNote: This update adds support for the 'jdk.ntlm.cache' system property\nwhich, when set to false, prevents caching of NTLM connections and\nauthentications and hence prevents this issue. However, caching remains\nenabled by default.\n\n* It was discovered that the Security component of OpenJDK did not allow\nusers to restrict the set of algorithms allowed for Jar integrity\nverification. This flaw could allow an attacker to modify content of the\nJar file that used weak signing key or hash algorithm. (CVE-2017-3539)\n\nNote: This updates extends the fix for CVE-2016-5542 released as part of\nthe RHSA-2016:2079 erratum to no longer allow the MD5 hash algorithm during\nthe Jar integrity verification by adding it to the\njdk.jar.disabledAlgorithms security property.\n\n* Newline injection flaws were discovered in FTP and SMTP client\nimplementations in the Networking component in OpenJDK. A remote attacker\ncould possibly use these flaws to manipulate FTP or SMTP connections\nestablished by a Java application. (CVE-2017-3533, CVE-2017-3544)\n\nNote: If the web browser plug-in provided by the icedtea-web package was\ninstalled, the issues exposed via Java applets could have been exploited\nwithout user interaction if a user visited a malicious website.\n\nBug Fix(es):\n\n* When a method is called using the Java Debug Wire Protocol (JDWP)\n'invokeMethod' command in a target Java virtual machine, JDWP creates\nglobal references for every Object that is implied in the method\ninvocation, as well as for the returned argument of the reference type.\nPreviously, the global references created for ... \n\n Description truncated, for more information please check the Reference URL\");\n script_tag(name: \"affected\", value: \"java on CentOS 7\");\n script_tag(name: \"solution\", value: \"Please Install the Updated Packages.\");\n\n script_xref(name: \"CESA\", value: \"2017:1108\");\n script_xref(name: \"URL\" , value: \"http://lists.centos.org/pipermail/centos-announce/2017-April/022399.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk\", rpm:\"java-1.8.0-openjdk~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-accessibility\", rpm:\"java-1.8.0-openjdk-accessibility~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-accessibility-debug\", rpm:\"java-1.8.0-openjdk-accessibility-debug~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-debug\", rpm:\"java-1.8.0-openjdk-debug~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-demo\", rpm:\"java-1.8.0-openjdk-demo~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-demo-debug\", rpm:\"java-1.8.0-openjdk-demo-debug~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-devel\", rpm:\"java-1.8.0-openjdk-devel~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-devel-debug\", rpm:\"java-1.8.0-openjdk-devel-debug~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-headless\", rpm:\"java-1.8.0-openjdk-headless~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-headless-debug\", rpm:\"java-1.8.0-openjdk-headless-debug~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-javadoc\", rpm:\"java-1.8.0-openjdk-javadoc~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-javadoc-debug\", rpm:\"java-1.8.0-openjdk-javadoc-debug~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-javadoc-zip\", rpm:\"java-1.8.0-openjdk-javadoc-zip~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-javadoc-zip-debug\", rpm:\"java-1.8.0-openjdk-javadoc-zip-debug~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-src\", rpm:\"java-1.8.0-openjdk-src~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"java-1.8.0-openjdk-src-debug\", rpm:\"java-1.8.0-openjdk-src-debug~1.8.0.131~2.b11.el7_3\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2018-08-31T00:08:20", "bulletinFamily": "unix", "description": "USN-3275-2 fixed vulnerabilities in OpenJDK 7. Unfortunately, the update introduced a regression when handling TLS handshakes. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that OpenJDK improperly re-used cached NTLM connections in some situations. A remote attacker could possibly use this to cause a Java application to perform actions with the credentials of a different user. (CVE-2017-3509)\n\nIt was discovered that an untrusted library search path flaw existed in the Java Cryptography Extension (JCE) component of OpenJDK. A local attacker could possibly use this to gain the privileges of a Java application. (CVE-2017-3511)\n\nIt was discovered that the Java API for XML Processing (JAXP) component in OpenJDK did not properly enforce size limits when parsing XML documents. An attacker could use this to cause a denial of service (processor and memory consumption). (CVE-2017-3526)\n\nIt was discovered that the FTP client implementation in OpenJDK did not properly sanitize user inputs. If a user was tricked into opening a specially crafted FTP URL, a remote attacker could use this to manipulate the FTP connection. (CVE-2017-3533)\n\nIt was discovered that OpenJDK allowed MD5 to be used as an algorithm for JAR integrity verification. An attacker could possibly use this to modify the contents of a JAR file without detection. (CVE-2017-3539)\n\nIt was discovered that the SMTP client implementation in OpenJDK did not properly sanitize sender and recipient addresses. A remote attacker could use this to specially craft email addresses and gain control of a Java application\u2019s SMTP connections. (CVE-2017-3544)", "modified": "2017-05-18T00:00:00", "published": "2017-05-18T00:00:00", "id": "USN-3275-3", "href": "https://usn.ubuntu.com/3275-3/", "title": "OpenJDK 7 regression", "type": "ubuntu", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T00:09:30", "bulletinFamily": "unix", "description": "USN-3275-1 fixed vulnerabilities in OpenJDK 8. This update provides the corresponding updates for OpenJDK 7.\n\nOriginal advisory details:\n\nIt was discovered that OpenJDK improperly re-used cached NTLM connections in some situations. A remote attacker could possibly use this to cause a Java application to perform actions with the credentials of a different user. (CVE-2017-3509)\n\nIt was discovered that an untrusted library search path flaw existed in the Java Cryptography Extension (JCE) component of OpenJDK. A local attacker could possibly use this to gain the privileges of a Java application. (CVE-2017-3511)\n\nIt was discovered that the Java API for XML Processing (JAXP) component in OpenJDK did not properly enforce size limits when parsing XML documents. An attacker could use this to cause a denial of service (processor and memory consumption). (CVE-2017-3526)\n\nIt was discovered that the FTP client implementation in OpenJDK did not properly sanitize user inputs. If a user was tricked into opening a specially crafted FTP URL, a remote attacker could use this to manipulate the FTP connection. (CVE-2017-3533)\n\nIt was discovered that OpenJDK allowed MD5 to be used as an algorithm for JAR integrity verification. An attacker could possibly use this to modify the contents of a JAR file without detection. (CVE-2017-3539)\n\nIt was discovered that the SMTP client implementation in OpenJDK did not properly sanitize sender and recipient addresses. A remote attacker could use this to specially craft email addresses and gain control of a Java application\u2019s SMTP connections. (CVE-2017-3544)", "modified": "2017-05-15T00:00:00", "published": "2017-05-15T00:00:00", "id": "USN-3275-2", "href": "https://usn.ubuntu.com/3275-2/", "title": "OpenJDK 7 vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T00:08:37", "bulletinFamily": "unix", "description": "It was discovered that OpenJDK improperly re-used cached NTLM connections in some situations. A remote attacker could possibly use this to cause a Java application to perform actions with the credentials of a different user. (CVE-2017-3509)\n\nIt was discovered that an untrusted library search path flaw existed in the Java Cryptography Extension (JCE) component of OpenJDK. A local attacker could possibly use this to gain the privileges of a Java application. (CVE-2017-3511)\n\nIt was discovered that the Java API for XML Processing (JAXP) component in OpenJDK did not properly enforce size limits when parsing XML documents. An attacker could use this to cause a denial of service (processor and memory consumption). (CVE-2017-3526)\n\nIt was discovered that the FTP client implementation in OpenJDK did not properly sanitize user inputs. If a user was tricked into opening a specially crafted FTP URL, a remote attacker could use this to manipulate the FTP connection. (CVE-2017-3533)\n\nIt was discovered that OpenJDK allowed MD5 to be used as an algorithm for JAR integrity verification. An attacker could possibly use this to modify the contents of a JAR file without detection. (CVE-2017-3539)\n\nIt was discovered that the SMTP client implementation in OpenJDK did not properly sanitize sender and recipient addresses. A remote attacker could use this to specially craft email addresses and gain control of a Java application\u2019s SMTP connections. (CVE-2017-3544)", "modified": "2017-05-11T00:00:00", "published": "2017-05-11T00:00:00", "id": "USN-3275-1", "href": "https://usn.ubuntu.com/3275-1/", "title": "OpenJDK 8 vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "debian": [{"lastseen": "2018-10-18T13:50:25", "bulletinFamily": "unix", "description": "Package : openjdk-7\nVersion : 7u131-2.6.9-2~deb7u1\nCVE ID : CVE-2017-3509 CVE-2017-3511 CVE-2017-3526 CVE-2017-3533\n CVE-2017-3539 CVE-2017-3544\n\nSeveral vulnerabilities have been discovered in OpenJDK, an\nimplementation of the Oracle Java platform, resulting in privilege\nescalation, denial of service, newline injection in SMTP or use of\ninsecure cryptography.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n7u131-2.6.9-2~deb7u1.\n\nWe recommend that you upgrade your openjdk-7 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "modified": "2017-05-26T16:57:37", "published": "2017-05-26T16:57:37", "id": "DEBIAN:DLA-954-1:B7896", "href": "https://lists.debian.org/debian-lts-announce/2017/debian-lts-announce-201705/msg00025.html", "title": "[SECURITY] [DLA 954-1] openjdk-7 security update", "type": "debian", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-10-16T22:14:29", "bulletinFamily": "unix", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3858-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nMay 19, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : openjdk-7\nCVE ID : CVE-2017-3509 CVE-2017-3511 CVE-2017-3526 CVE-2017-3533 \n CVE-2017-3539 CVE-2017-3544\n\nSeveral vulnerabilities have been discovered in OpenJDK, an\nimplementation of the Oracle Java platform, resulting in privilege\nescalation, denial of service, newline injection in SMTP or use of\ninsecure cryptography.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 7u131-2.6.9-2~deb8u1.\n\nWe recommend that you upgrade your openjdk-7 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "modified": "2017-05-19T20:54:56", "published": "2017-05-19T20:54:56", "id": "DEBIAN:DSA-3858-1:50A8A", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00118.html", "title": "[SECURITY] [DSA 3858-1] openjdk-7 security update", "type": "debian", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "centos": [{"lastseen": "2017-10-03T18:25:29", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2017:1204\n\n\nThe java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An untrusted library search path flaw was found in the JCE component of OpenJDK. A local attacker could possibly use this flaw to cause a Java application using JCE to load an attacker-controlled library and hence escalate their privileges. (CVE-2017-3511)\n\n* It was found that the JAXP component of OpenJDK failed to correctly enforce parse tree size limits when parsing XML document. An attacker able to make a Java application parse a specially crafted XML document could use this flaw to make it consume an excessive amount of CPU and memory. (CVE-2017-3526)\n\n* It was discovered that the HTTP client implementation in the Networking component of OpenJDK could cache and re-use an NTLM authenticated connection in a different security context. A remote attacker could possibly use this flaw to make a Java application perform HTTP requests authenticated with credentials of a different user. (CVE-2017-3509)\n\nNote: This update adds support for the \"jdk.ntlm.cache\" system property which, when set to false, prevents caching of NTLM connections and authentications and hence prevents this issue. However, caching remains enabled by default.\n\n* It was discovered that the Security component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2017-3539)\n\nNote: This updates extends the fix for CVE-2016-5542 released as part of the RHSA-2016:2658 erratum to no longer allow the MD5 hash algorithm during the Jar integrity verification by adding it to the jdk.jar.disabledAlgorithms security property.\n\n* Newline injection flaws were discovered in FTP and SMTP client implementations in the Networking component in OpenJDK. A remote attacker could possibly use these flaws to manipulate FTP or SMTP connections established by a Java application. (CVE-2017-3533, CVE-2017-3544)\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2017-May/022404.html\nhttp://lists.centos.org/pipermail/centos-announce/2017-May/022407.html\n\n**Affected packages:**\njava-1.7.0-openjdk\njava-1.7.0-openjdk-accessibility\njava-1.7.0-openjdk-demo\njava-1.7.0-openjdk-devel\njava-1.7.0-openjdk-headless\njava-1.7.0-openjdk-javadoc\njava-1.7.0-openjdk-src\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2017-1204.html", "modified": "2017-05-09T21:04:58", "published": "2017-05-09T16:59:58", "href": "http://lists.centos.org/pipermail/centos-announce/2017-May/022404.html", "id": "CESA-2017:1204", "title": "java security update", "type": "centos", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-10-03T18:25:18", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2017:1108\n\n\nThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An untrusted library search path flaw was found in the JCE component of OpenJDK. A local attacker could possibly use this flaw to cause a Java application using JCE to load an attacker-controlled library and hence escalate their privileges. (CVE-2017-3511)\n\n* It was found that the JAXP component of OpenJDK failed to correctly enforce parse tree size limits when parsing XML document. An attacker able to make a Java application parse a specially crafted XML document could use this flaw to make it consume an excessive amount of CPU and memory. (CVE-2017-3526)\n\n* It was discovered that the HTTP client implementation in the Networking component of OpenJDK could cache and re-use an NTLM authenticated connection in a different security context. A remote attacker could possibly use this flaw to make a Java application perform HTTP requests authenticated with credentials of a different user. (CVE-2017-3509)\n\nNote: This update adds support for the \"jdk.ntlm.cache\" system property which, when set to false, prevents caching of NTLM connections and authentications and hence prevents this issue. However, caching remains enabled by default.\n\n* It was discovered that the Security component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2017-3539)\n\nNote: This updates extends the fix for CVE-2016-5542 released as part of the RHSA-2016:2079 erratum to no longer allow the MD5 hash algorithm during the Jar integrity verification by adding it to the jdk.jar.disabledAlgorithms security property.\n\n* Newline injection flaws were discovered in FTP and SMTP client implementations in the Networking component in OpenJDK. A remote attacker could possibly use these flaws to manipulate FTP or SMTP connections established by a Java application. (CVE-2017-3533, CVE-2017-3544)\n\nNote: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.\n\nBug Fix(es):\n\n* When a method is called using the Java Debug Wire Protocol (JDWP) \"invokeMethod\" command in a target Java virtual machine, JDWP creates global references for every Object that is implied in the method invocation, as well as for the returned argument of the reference type. Previously, the global references created for such arguments were not collected (deallocated) by the garbage collector after \"invokeMethod\" finished. This consequently caused memory leaks, and because references to such objects were never released, the debugged application could be terminated with an Out of Memory error. This bug has been fixed, and the described problem no longer occurs. (BZ#1442162)\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2017-April/022399.html\n\n**Affected packages:**\njava-1.8.0-openjdk\njava-1.8.0-openjdk-accessibility\njava-1.8.0-openjdk-accessibility-debug\njava-1.8.0-openjdk-debug\njava-1.8.0-openjdk-demo\njava-1.8.0-openjdk-demo-debug\njava-1.8.0-openjdk-devel\njava-1.8.0-openjdk-devel-debug\njava-1.8.0-openjdk-headless\njava-1.8.0-openjdk-headless-debug\njava-1.8.0-openjdk-javadoc\njava-1.8.0-openjdk-javadoc-debug\njava-1.8.0-openjdk-javadoc-zip\njava-1.8.0-openjdk-javadoc-zip-debug\njava-1.8.0-openjdk-src\njava-1.8.0-openjdk-src-debug\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2017-1108.html", "modified": "2017-04-20T23:21:35", "published": "2017-04-20T23:21:35", "href": "http://lists.centos.org/pipermail/centos-announce/2017-April/022399.html", "id": "CESA-2017:1108", "title": "java security update", "type": "centos", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "amazon": [{"lastseen": "2018-10-02T16:55:10", "bulletinFamily": "unix", "description": "**Issue Overview:**\n\nAn untrusted library search path flaw was found in the JCE component of \nOpenJDK. A local attacker could possibly use this flaw to cause a Java \napplication using JCE to load an attacker-controlled library and hence escalate \ntheir privileges. ([CVE-2017-3511 __](<https://access.redhat.com/security/cve/CVE-2017-3511>))\n\nIt was found that the JAXP component of OpenJDK failed to correctly enforce \nparse tree size limits when parsing XML document. An attacker able to make a \nJava application parse a specially crafted XML document could use this flaw to \nmake it consume an excessive amount of CPU and memory. ([CVE-2017-3526 __](<https://access.redhat.com/security/cve/CVE-2017-3526>))\n\nIt was discovered that the HTTP client implementation in the Networking \ncomponent of OpenJDK could cache and re-use an NTLM authenticated connection in \na different security context. A remote attacker could possibly use this flaw to \nmake a Java application perform HTTP requests authenticated with credentials of \na different user. ([CVE-2017-3509 __](<https://access.redhat.com/security/cve/CVE-2017-3509>))\n\nIt was discovered that the Security component of OpenJDK did not allow users \nto restrict the set of algorithms allowed for Jar integrity verification. This \nflaw could allow an attacker to modify content of the Jar file that used weak \nsigning key or hash algorithm. ([CVE-2017-3539 __](<https://access.redhat.com/security/cve/CVE-2017-3539>))\n\nNewline injection flaws were discovered in FTP and SMTP client implementations \nin the Networking component in OpenJDK. A remote attacker could possibly use \nthese flaws to manipulate FTP or SMTP connections established by a Java \napplication. ([CVE-2017-3533 __](<https://access.redhat.com/security/cve/CVE-2017-3533>), [CVE-2017-3544 __](<https://access.redhat.com/security/cve/CVE-2017-3544>))\n\nNote: This update adds support for the \"jdk.ntlm.cache\" system property which, \nwhen set to false, prevents caching of NTLM connections and authentications and \nhence prevents this issue. However, caching remains enabled by default.\n\nNote: This updates extends the fix for [CVE-2016-5542 __](<https://access.redhat.com/security/cve/CVE-2016-5542>) released as part of the \n[RHSA-2016-2658 __](<https://rhn.redhat.com/errata/RHSA-2016-2658.html>) erratum to no longer allow the MD5 hash algorithm during the Jar \nintegrity verification by adding it to the jdk.jar.disabledAlgorithms security \nproperty. \n\n\n \n**Affected Packages:** \n\n\njava-1.7.0-openjdk\n\n \n**Issue Correction:** \nRun _yum update java-1.7.0-openjdk_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n i686: \n java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.73.amzn1.i686 \n java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.73.amzn1.i686 \n java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.73.amzn1.i686 \n java-1.7.0-openjdk-debuginfo-1.7.0.141-2.6.10.1.73.amzn1.i686 \n java-1.7.0-openjdk-1.7.0.141-2.6.10.1.73.amzn1.i686 \n \n noarch: \n java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.73.amzn1.noarch \n \n src: \n java-1.7.0-openjdk-1.7.0.141-2.6.10.1.73.amzn1.src \n \n x86_64: \n java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.73.amzn1.x86_64 \n java-1.7.0-openjdk-1.7.0.141-2.6.10.1.73.amzn1.x86_64 \n java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.73.amzn1.x86_64 \n java-1.7.0-openjdk-debuginfo-1.7.0.141-2.6.10.1.73.amzn1.x86_64 \n java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.73.amzn1.x86_64 \n \n \n", "modified": "2017-06-06T22:43:00", "published": "2017-06-06T22:43:00", "id": "ALAS-2017-835", "href": "https://alas.aws.amazon.com/ALAS-2017-835.html", "title": "Medium: java-1.7.0-openjdk", "type": "amazon", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-10-02T16:55:11", "bulletinFamily": "unix", "description": "**Issue Overview:**\n\nImproper re-use of NTLM authenticated connections (Networking, 8163520): \nIt was discovered that the HTTP client implementation in the Networking component of OpenJDK could cache and re-use an NTLM authenticated connection in a different security context. A remote attacker could possibly use this flaw to make a Java application perform HTTP requests authenticated with credentials of a different user. ([CVE-2017-3509 __](<https://access.redhat.com/security/cve/CVE-2017-3509>))\n\nNewline injection in the SMTP client (Networking, 8171533): \nA newline injection flaw was discovered in the SMTP client implementation in the Networking component in OpenJDK. A remote attacker could possibly use this flaw to manipulate SMTP connections established by a Java application. ([CVE-2017-3544 __](<https://access.redhat.com/security/cve/CVE-2017-3544>))\n\nNewline injection in the FTP client (Networking, 8170222) \nA newline injection flaw was discovered in the FTP client implementation in the Networking component in OpenJDK. A remote attacker could possibly use this flaw to manipulate FTP connections established by a Java application. ([CVE-2017-3533 __](<https://access.redhat.com/security/cve/CVE-2017-3533>))\n\nMissing algorithm restrictions for jar verification (Libraries, 8155973): \nIt was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for JAR integrity verification. This flaw could allow an attacker to modify content of the JAR file that used weak signing key or hash algorithm. ([CVE-2016-5542 __](<https://access.redhat.com/security/cve/CVE-2016-5542>))\n\nUntrusted extension directories search path in Launcher (JCE, 8163528) \nAn untrusted library search path flaw was found in the JCE component of OpenJDK. A local attacker could possibly use this flaw to cause a Java application using JCE to load an attacker-controlled library and hence escalate their privileges. ([CVE-2017-3511 __](<https://access.redhat.com/security/cve/CVE-2017-3511>))\n\nMD5 allowed for jar verification (Security, 8171121) \nIt was discovered that the Security component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. ([CVE-2017-3539 __](<https://access.redhat.com/security/cve/CVE-2017-3539>))\n\nIncomplete XML parse tree size enforcement (JAXP, 8169011) \nIt was found that the JAXP component of OpenJDK failed to correctly enforce parse tree size limits when parsing XML document. An attacker able to make a Java application parse a specially crafted XML document could use this flaw to make it consume an excessive amount of CPU and memory. ([CVE-2017-3526 __](<https://access.redhat.com/security/cve/CVE-2017-3526>)) \n\n\n \n**Affected Packages:** \n\n\njava-1.8.0-openjdk\n\n \n**Issue Correction:** \nRun _yum update java-1.8.0-openjdk_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n i686: \n java-1.8.0-openjdk-headless-1.8.0.131-2.b11.30.amzn1.i686 \n java-1.8.0-openjdk-devel-1.8.0.131-2.b11.30.amzn1.i686 \n java-1.8.0-openjdk-1.8.0.131-2.b11.30.amzn1.i686 \n java-1.8.0-openjdk-src-1.8.0.131-2.b11.30.amzn1.i686 \n java-1.8.0-openjdk-demo-1.8.0.131-2.b11.30.amzn1.i686 \n java-1.8.0-openjdk-debuginfo-1.8.0.131-2.b11.30.amzn1.i686 \n \n noarch: \n java-1.8.0-openjdk-javadoc-zip-1.8.0.131-2.b11.30.amzn1.noarch \n java-1.8.0-openjdk-javadoc-1.8.0.131-2.b11.30.amzn1.noarch \n \n src: \n java-1.8.0-openjdk-1.8.0.131-2.b11.30.amzn1.src \n \n x86_64: \n java-1.8.0-openjdk-src-1.8.0.131-2.b11.30.amzn1.x86_64 \n java-1.8.0-openjdk-debuginfo-1.8.0.131-2.b11.30.amzn1.x86_64 \n java-1.8.0-openjdk-demo-1.8.0.131-2.b11.30.amzn1.x86_64 \n java-1.8.0-openjdk-headless-1.8.0.131-2.b11.30.amzn1.x86_64 \n java-1.8.0-openjdk-1.8.0.131-2.b11.30.amzn1.x86_64 \n java-1.8.0-openjdk-devel-1.8.0.131-2.b11.30.amzn1.x86_64 \n \n \n", "modified": "2017-05-10T23:59:00", "published": "2017-05-10T23:59:00", "id": "ALAS-2017-827", "href": "https://alas.aws.amazon.com/ALAS-2017-827.html", "title": "Medium: java-1.8.0-openjdk", "type": "amazon", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}]}