Oracle Java SE Multiple Vulnerabilities (February 2013 CPU)

critical Nessus Plugin ID 64454

Synopsis

The remote Windows host contains a programming platform that is potentially affected by multiple vulnerabilities.

Description

The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier than 7 Update 13 or 6 Update 39, or is earlier than or equal to 5 Update 38 or 1.4.2 Update 40. It is, therefore, potentially affected by security issues in the following components :

- 2D
- AWT
- Beans
- CORBA
- Deployment
- Install
- JavaFX
- JAXP
- JAX-WS
- JMX
- JSSE
- Libraries
- Networking
- RMI
- Scripting
- Sound

Solution

Update to JDK / JRE 7 Update 13 or 6 Update 39 or later and, if necessary, remove any affected versions.

See Also

https://seclists.org/fulldisclosure/2013/Feb/12

http://www.security-explorations.com/en/SE-2012-01-details.html

http://www.zerodayinitiative.com/advisories/ZDI-13-010/

http://www.zerodayinitiative.com/advisories/ZDI-13-011/

https://www.zerodayinitiative.com/advisories/ZDI-13-012/

https://www.zerodayinitiative.com/advisories/ZDI-13-013/

http://www.zerodayinitiative.com/advisories/ZDI-13-022/

https://www.zerodayinitiative.com/advisories/ZDI-13-023/

http://www.nessus.org/u?a915dbbd

Plugin Details

Severity: Critical

ID: 64454

File Name: oracle_java_cpu_feb_2013.nasl

Version: 1.25

Type: local

Agent: windows

Family: Windows

Published: 2/4/2013

Updated: 5/25/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.3

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-1489

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:jre, cpe:/a:oracle:jdk

Required KB Items: SMB/Java/JRE/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/1/2013

Vulnerability Publication Date: 1/19/2013

CISA Known Exploited Vulnerability Due Dates: 6/15/2022

Exploitable With

Core Impact

Metasploit (Java Applet JMX Remote Code Execution)

Reference Information

CVE: CVE-2012-1541, CVE-2012-1543, CVE-2012-3213, CVE-2012-3342, CVE-2012-4301, CVE-2012-4305, CVE-2013-0351, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0431, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0436, CVE-2013-0437, CVE-2013-0438, CVE-2013-0439, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0444, CVE-2013-0445, CVE-2013-0446, CVE-2013-0447, CVE-2013-0448, CVE-2013-0449, CVE-2013-0450, CVE-2013-1472, CVE-2013-1473, CVE-2013-1474, CVE-2013-1475, CVE-2013-1476, CVE-2013-1477, CVE-2013-1478, CVE-2013-1479, CVE-2013-1480, CVE-2013-1481, CVE-2013-1482, CVE-2013-1483, CVE-2013-1489

BID: 57681, 57682, 57683, 57684, 57685, 57686, 57687, 57688, 57689, 57690, 57691, 57692, 57693, 57694, 57695, 57696, 57697, 57699, 57700, 57701, 57702, 57703, 57704, 57705, 57706, 57707, 57708, 57709, 57710, 57711, 57712, 57713, 57714, 57715, 57716, 57717, 57718, 57719, 57720, 57721, 57722, 57723, 57724, 57725, 57726, 57727, 57728, 57729, 57730, 57731

CERT: 858729