SuSE 11.3 Security Update : java-1_7_0-openjdk (SAT Patch Number 10621)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

OpenJDK was updated to version 2.5.5 - OpenJDK 7u79 to fix security
issues and bugs.

The following vulnerabilities have been fixed :

- Deployment: unauthenticated remote attackers could
execute arbitrary code via multiple protocols.
(CVE-2015-0458)

- 2D: unauthenticated remote attackers could execute
arbitrary code via multiple protocols. (CVE-2015-0459)

- Hotspot: unauthenticated remote attackers could execute
arbitrary code via multiple protocols. (CVE-2015-0460)

- 2D: unauthenticated remote attackers could execute
arbitrary code via multiple protocols. (CVE-2015-0469)

- Beans: unauthenticated remote attackers could update,
insert or delete some JAVA accessible data via multiple
protocols. (CVE-2015-0477)

- JCE: unauthenticated remote attackers could read some
JAVA accessible data via multiple protocols.
(CVE-2015-0478)

- Tools: unauthenticated remote attackers could update,
insert or delete some JAVA accessible data via multiple
protocols and cause a partial denial of service (partial
DOS). (CVE-2015-0480)

- JavaFX: unauthenticated remote attackers could read,
update, insert or delete access some Java accessible
data via multiple protocols and cause a partial denial
of service (partial DOS). (CVE-2015-0484)

- JSSE: unauthenticated remote attackers could cause a
partial denial of service (partial DOS). (CVE-2015-0488)

- 2D: unauthenticated remote attackers could execute
arbitrary code via multiple protocols. (CVE-2015-0491)

- JavaFX: unauthenticated remote attackers could execute
arbitrary code via multiple protocols. (CVE-2015-0492)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=927591
http://support.novell.com/security/cve/CVE-2015-0458.html
http://support.novell.com/security/cve/CVE-2015-0459.html
http://support.novell.com/security/cve/CVE-2015-0460.html
http://support.novell.com/security/cve/CVE-2015-0469.html
http://support.novell.com/security/cve/CVE-2015-0477.html
http://support.novell.com/security/cve/CVE-2015-0478.html
http://support.novell.com/security/cve/CVE-2015-0480.html
http://support.novell.com/security/cve/CVE-2015-0484.html
http://support.novell.com/security/cve/CVE-2015-0488.html
http://support.novell.com/security/cve/CVE-2015-0491.html
http://support.novell.com/security/cve/CVE-2015-0492.html

Solution :

Apply SAT patch number 10621.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now