Debian DSA-1769-1 : openjdk-6 - several vulnerabilities

Critical Nessus Plugin ID 36142

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been identified in OpenJDK, an implementation of the Java SE platform.

- CVE-2006-2426 Creation of large, temporary fonts could use up available disk space, leading to a denial of service condition.

- CVE-2009-0581 / CVE-2009-0723 / CVE-2009-0733 / CVE-2009-0793

Several vulnerabilities existed in the embedded LittleCMS library, exploitable through crafted images: a memory leak, resulting in a denial of service condition (CVE-2009-0581 ), heap-based buffer overflows, potentially allowing arbitrary code execution (CVE-2009-0723, CVE-2009-0733 ), and a NULL pointer dereference, leading to denial of service (CVE-2009-0793 ).

- CVE-2009-1093 The LDAP server implementation (in com.sun.jdni.ldap) did not properly close sockets if an error was encountered, leading to a denial-of-service condition.

- CVE-2009-1094 The LDAP client implementation (in com.sun.jdni.ldap) allowed malicious LDAP servers to execute arbitrary code on the client.

- CVE-2009-1101 The HTTP server implementation (sun.net.httpserver) contained an unspecified denial of service vulnerability.

- CVE-2009-1095 / CVE-2009-1096 / CVE-2009-1097 / CVE-2009-1098

Several issues in Java Web Start have been addressed.
The Debian packages currently do not support Java Web Start, so these issues are not directly exploitable, but the relevant code has been updated nevertheless.

Solution

Upgrade the openjdk-6 packages.

For the stable distribution (lenny), these problems have been fixed in version 9.1+lenny2.

See Also

https://security-tracker.debian.org/tracker/CVE-2006-2426

https://security-tracker.debian.org/tracker/CVE-2009-0581

https://security-tracker.debian.org/tracker/CVE-2009-0723

https://security-tracker.debian.org/tracker/CVE-2009-0733

https://security-tracker.debian.org/tracker/CVE-2009-0793

https://security-tracker.debian.org/tracker/CVE-2009-0581

https://security-tracker.debian.org/tracker/CVE-2009-0723

https://security-tracker.debian.org/tracker/CVE-2009-0733

https://security-tracker.debian.org/tracker/CVE-2009-0793

https://security-tracker.debian.org/tracker/CVE-2009-1093

https://security-tracker.debian.org/tracker/CVE-2009-1094

https://security-tracker.debian.org/tracker/CVE-2009-1101

https://security-tracker.debian.org/tracker/CVE-2009-1095

https://security-tracker.debian.org/tracker/CVE-2009-1096

https://security-tracker.debian.org/tracker/CVE-2009-1097

https://security-tracker.debian.org/tracker/CVE-2009-1098

https://www.debian.org/security/2009/dsa-1769

Plugin Details

Severity: Critical

ID: 36142

File Name: debian_DSA-1769.nasl

Version: 1.26

Type: local

Agent: unix

Published: 2009/04/13

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openjdk-6, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/04/11

Reference Information

CVE: CVE-2006-2426, CVE-2009-0581, CVE-2009-0723, CVE-2009-0733, CVE-2009-0793, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1101

BID: 34185, 34240, 34411

DSA: 1769

CWE: 16, 20, 119, 189, 399