Oracle Java SE Multiple Vulnerabilities (March 2010 CPU) (Unix)

high Nessus Plugin ID 64842
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 9

Synopsis

The remote Unix host contains a runtime environment that is affected by multiple vulnerabilities.

Description

The version of Oracle (formerly Sun) Java Runtime Environment (JRE) installed on the remote host is earlier than 6 Update 19 / 5.0 Update 24 / 1.4.2_26. Such versions are potentially affected by security issues in the following components :

- ImageIO
- Java 2D
- JRE
- Java Web Start, Java Plug-in
- Pack200
- Sound
- JSSE
- HotSpot Server

Solution

Update to JDK / JRE 6 Update 19, JDK 5.0 Update 24, SDK 1.4.2_26 or later and remove, if necessary, any affected versions.

Note that an Extended Support contract with Oracle is needed to obtain JDK 5.0 Update 24 or later.

See Also

http://www.oracle.com/technetwork/java/eol-135779.html

http://www.nessus.org/u?b93c78e2

Plugin Details

Severity: High

ID: 64842

File Name: oracle_java_cpu_mar_2010_unix.nasl

Version: 1.8

Type: local

Agent: unix

Family: Misc.

Published: 2/22/2013

Updated: 7/18/2018

Dependencies: sun_java_jre_installed_unix.nasl

Risk Information

Risk Factor: High

VPR Score: 9

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*

Required KB Items: Host/Java/JRE/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/30/2010

Vulnerability Publication Date: 3/30/2010

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Java MixerSequencer Object GM_Song Structure Handling Vulnerability)

Reference Information

CVE: CVE-2010-0094, CVE-2010-0840, CVE-2009-3555, CVE-2010-0082, CVE-2010-0084, CVE-2010-0085, CVE-2010-0088, CVE-2010-0091, CVE-2010-0092, CVE-2010-0093, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0845, CVE-2010-0847, CVE-2010-0848, CVE-2010-0087, CVE-2010-0089, CVE-2010-0839, CVE-2010-0090, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0846, CVE-2010-0849, CVE-2010-0850, CVE-2009-3910

BID: 36935, 39065, 39069, 39071, 39072, 39075, 39078, 39081, 39085, 39086, 39088, 39089, 39090, 39093, 39094, 39096, 39062, 39067, 39068, 39070, 39073, 39077, 39083, 39084, 39091, 39095, 39082, 38973, 39559

CWE: 310