SuSE 11.2 Security Update : OpenJDK 1.6 (SAT Patch Number 8598)

critical Nessus Plugin ID 71171
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

OpenJDK 1.6 was updated to the new Icedtea release 1.12.7, which includes many fixes for bugs and security issues :

- S8006900, CVE-2013-3829: Add new date/time capability

- S8008589: Better MBean permission validation

- S8011071, CVE-2013-5780: Better crypto provider handling

- S8011081, CVE-2013-5772: Improve jhat

- S8011157, CVE-2013-5814: Improve CORBA portablility

- S8012071, CVE-2013-5790: Better Building of Beans

- S8012147: Improve tool support

- S8012277: CVE-2013-5849: Improve AWT DataFlavor

- S8012425, CVE-2013-5802: Transform TransformerFactory

- S8013503, CVE-2013-5851: Improve stream factories

- S8013506: Better Pack200 data handling

- S8013510, CVE-2013-5809: Augment image writing code

- S8013514: Improve stability of cmap class

- S8013739, CVE-2013-5817: Better LDAP resource management

- S8013744, CVE-2013-5783: Better tabling for AWT

- S8014085: Better serialization support in JMX classes

- S8014093, CVE-2013-5782: Improve parsing of images

- S8014102, CVE-2013-5778: Improve image conversion

- S8014341, CVE-2013-5803: Better service from Kerberos servers

- S8014349, CVE-2013-5840: (cl) Class.getDeclaredClass problematic in some class loader configurations

- S8014530, CVE-2013-5825: Better digital signature processing

- S8014534: Better profiling support

- S8014987, CVE-2013-5842: Augment serialization handling

- S8015614: Update build settings

- S8015731: Subject java.security.auth.subject to improvements

- S8015743, CVE-2013-5774: Address internet addresses

- S8016256: Make finalization final

- S8016653, CVE-2013-5804: javadoc should ignore ignoreable characters in names

- S8016675, CVE-2013-5797: Make Javadoc pages more robust

- S8017196, CVE-2013-5850: Ensure Proxies are handled appropriately

- S8017287, CVE-2013-5829: Better resource disposal

- S8017291, CVE-2013-5830: Cast Proxies Aside

- S8017298, CVE-2013-4002: Better XML support

- S8017300, CVE-2013-5784: Improve Interface Implementation

- S8017505, CVE-2013-5820: Better Client Service

- S8019292: Better Attribute Value Exceptions

- S8019617: Better view of objects

- S8020293: JVM crash

- S8021290, CVE-2013-5823: Better signature validation

- S8022940: Enhance CORBA translations

- S8023683: Enhance class file parsing

Solution

Apply SAT patch number 8598.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=852367

http://support.novell.com/security/cve/CVE-2013-3829.html

http://support.novell.com/security/cve/CVE-2013-4002.html

http://support.novell.com/security/cve/CVE-2013-5772.html

http://support.novell.com/security/cve/CVE-2013-5774.html

http://support.novell.com/security/cve/CVE-2013-5778.html

http://support.novell.com/security/cve/CVE-2013-5780.html

http://support.novell.com/security/cve/CVE-2013-5782.html

http://support.novell.com/security/cve/CVE-2013-5783.html

http://support.novell.com/security/cve/CVE-2013-5784.html

http://support.novell.com/security/cve/CVE-2013-5790.html

http://support.novell.com/security/cve/CVE-2013-5797.html

http://support.novell.com/security/cve/CVE-2013-5802.html

http://support.novell.com/security/cve/CVE-2013-5803.html

http://support.novell.com/security/cve/CVE-2013-5804.html

http://support.novell.com/security/cve/CVE-2013-5809.html

http://support.novell.com/security/cve/CVE-2013-5814.html

http://support.novell.com/security/cve/CVE-2013-5817.html

http://support.novell.com/security/cve/CVE-2013-5820.html

http://support.novell.com/security/cve/CVE-2013-5823.html

http://support.novell.com/security/cve/CVE-2013-5825.html

http://support.novell.com/security/cve/CVE-2013-5829.html

http://support.novell.com/security/cve/CVE-2013-5830.html

http://support.novell.com/security/cve/CVE-2013-5840.html

http://support.novell.com/security/cve/CVE-2013-5842.html

http://support.novell.com/security/cve/CVE-2013-5849.html

http://support.novell.com/security/cve/CVE-2013-5850.html

http://support.novell.com/security/cve/CVE-2013-5851.html

Plugin Details

Severity: Critical

ID: 71171

File Name: suse_11_java-1_6_0-openjdk-131129.nasl

Version: 1.3

Type: local

Agent: unix

Published: 12/3/2013

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:java-1_6_0-openjdk, p-cpe:/a:novell:suse_linux:11:java-1_6_0-openjdk-demo, p-cpe:/a:novell:suse_linux:11:java-1_6_0-openjdk-devel, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 11/29/2013

Reference Information

CVE: CVE-2013-3829, CVE-2013-4002, CVE-2013-5772, CVE-2013-5774, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5790, CVE-2013-5797, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5814, CVE-2013-5817, CVE-2013-5820, CVE-2013-5823, CVE-2013-5825, CVE-2013-5829, CVE-2013-5830, CVE-2013-5840, CVE-2013-5842, CVE-2013-5849, CVE-2013-5850, CVE-2013-5851