Mandriva Linux Security Advisory : java-1.6.0-openjdk (MDVSA-2012:095)

critical Nessus Plugin ID 59561

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple security issues were identified and fixed in OpenJDK (icedtea6) :

- S7079902, CVE-2012-1711: Refine CORBA data models

- S7143617, CVE-2012-1713: Improve fontmanager layout lookup operations

- S7143614, CVE-2012-1716: SynthLookAndFeel stability improvement

- S7143606, CVE-2012-1717: File.createTempFile should be improved for temporary files created by the platform.

- S7143872, CVE-2012-1718: Improve certificate extension processing

- S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC

- S7152811, CVE-2012-1723: Issues in client compiler

- S7157609, CVE-2012-1724: Issues with loop

- S7160757, CVE-2012-1725: Problem with hotspot/runtime_classfile

- S7110720: Issue with vm config file loadingIssue with vm config file loading

- S7145239: Finetune package definition restriction

- S7160677: missing else in fix for 7152811

The updated packages provides icedtea6-1.11.3 which is not vulnerable to these issues.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?19419b64

http://www.nessus.org/u?7760536b

Plugin Details

Severity: Critical

ID: 59561

File Name: mandriva_MDVSA-2012-095.nasl

Version: 1.15

Type: local

Published: 6/19/2012

Updated: 3/8/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:java-1.6.0-openjdk, p-cpe:/a:mandriva:linux:java-1.6.0-openjdk-demo, p-cpe:/a:mandriva:linux:java-1.6.0-openjdk-devel, p-cpe:/a:mandriva:linux:java-1.6.0-openjdk-javadoc, p-cpe:/a:mandriva:linux:java-1.6.0-openjdk-src, cpe:/o:mandriva:linux:2010.1, cpe:/o:mandriva:linux:2011

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/18/2012

CISA Known Exploited Vulnerability Due Dates: 3/24/2022

Exploitable With

Core Impact

Metasploit (Java Applet Field Bytecode Verifier Cache Remote Code Execution)

Reference Information

CVE: CVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1723, CVE-2012-1724, CVE-2012-1725

MDVSA: 2012:095