Ubuntu Security Notice (C) 2009-2016 Canonical, Inc. / NASL script (C) 2009-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related
It was discovered that the XML HMAC signature system did not correctly
check certain lengths. If an attacker sent a truncated HMAC, it could
bypass authentication, leading to potential privilege escalation.
It was discovered that JAR bundles would appear signed if only one
element was signed. If a user were tricked into running a malicious
Java applet, a remote attacker could exploit this to gain access to
private information and potentially run untrusted code.
It was discovered that certain variables could leak information. If a
user were tricked into running a malicious Java applet, a remote
attacker could exploit this to gain access to private information and
potentially run untrusted code. (CVE-2009-2475, CVE-2009-2690)
A flaw was discovered the OpenType checking. If a user were tricked
into running a malicious Java applet, a remote attacker could bypass
access restrictions. (CVE-2009-2476)
It was discovered that the XML processor did not correctly check
recursion. If a user or automated system were tricked into processing
a specially crafted XML, the system could crash, leading to a denial
of service. (CVE-2009-2625)
It was discovered that the Java audio subsystem did not correctly
validate certain parameters. If a user were tricked into running an
untrusted applet, a remote attacker could read system properties.
Multiple flaws were discovered in the proxy subsystem. If a user were
tricked into running an untrusted applet, a remote attacker could
discover local user names, obtain access to sensitive information, or
bypass socket restrictions, leading to a loss of privacy.
(CVE-2009-2671, CVE-2009-2672, CVE-2009-2673)
Flaws were discovered in the handling of JPEG images, Unpack200
archives, and JDK13Services. If a user were tricked into running an
untrusted applet, a remote attacker could load a specially crafted
file that would bypass local file access protections and run arbitrary
code with user privileges. (CVE-2009-2674, CVE-2009-2675,
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 40547 ()
Bugtraq ID: 3567135922359393594235943359443594635958
CVE ID: CVE-2009-0217CVE-2009-1896CVE-2009-2475CVE-2009-2476CVE-2009-2625CVE-2009-2670CVE-2009-2671CVE-2009-2672CVE-2009-2673CVE-2009-2674CVE-2009-2675CVE-2009-2676CVE-2009-2689CVE-2009-2690
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.