Debian DSA-2507-1 : openjdk-6 - several vulnerabilities

Critical Nessus Plugin ID 59839

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 9.8

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform.

- CVE-2012-1711 CVE-2012-1719 Multiple errors in the CORBA implementation could lead to breakouts of the Java sandbox.

- CVE-2012-1713 Missing input sanitising in the font manager could lead to the execution of arbitrary code.

- CVE-2012-1716 The SynthLookAndFeel Swing class could be abused to break out of the Java sandbox.

- CVE-2012-1717 Several temporary files were created insecurely, resulting in local information disclosure.

- CVE-2012-1718 Certificate revocation lists were incorrectly implemented.

- CVE-2012-1723 CVE-2012-1725 Validation errors in the bytecode verifier of the Hotspot VM could lead to breakouts of the Java sandbox.

- CVE-2012-1724 Missing input sanitising in the XML parser could lead to denial of service through an infinite loop.

Solution

Upgrade the openjdk-6 packages.

For the stable distribution (squeeze), this problem has been fixed in version 6b18-1.8.13-0+squeeze2.

See Also

https://security-tracker.debian.org/tracker/CVE-2012-1711

https://security-tracker.debian.org/tracker/CVE-2012-1719

https://security-tracker.debian.org/tracker/CVE-2012-1713

https://security-tracker.debian.org/tracker/CVE-2012-1716

https://security-tracker.debian.org/tracker/CVE-2012-1717

https://security-tracker.debian.org/tracker/CVE-2012-1718

https://security-tracker.debian.org/tracker/CVE-2012-1723

https://security-tracker.debian.org/tracker/CVE-2012-1725

https://security-tracker.debian.org/tracker/CVE-2012-1724

https://packages.debian.org/source/squeeze/openjdk-6

https://www.debian.org/security/2012/dsa-2507

Plugin Details

Severity: Critical

ID: 59839

File Name: debian_DSA-2507.nasl

Version: 1.17

Type: local

Agent: unix

Published: 2012/07/05

Updated: 2020/03/12

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 9.8

CVSS v2.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openjdk-6, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/07/04

Exploitable With

Core Impact

Metasploit (Java Applet Field Bytecode Verifier Cache Remote Code Execution)

Reference Information

CVE: CVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1723, CVE-2012-1724, CVE-2012-1725

BID: 53946, 53947, 53949, 53950, 53951, 53952, 53954, 53958, 53960

DSA: 2507