openSUSE Security Update : java-1_7_0-openjdk (openSUSE-SU-2012:1419-1) (ROBOT)

Critical Nessus Plugin ID 74793


The remote openSUSE host is missing a security update.


java-1_7_0-opendjk was updated to icedtea-2.3.3 (bnc#785814)

- Security fixes

- S6631398, CVE-2012-3216: FilePermission improved path checking

- S7093490: adjust package access in rmiregistry

- S7143535, CVE-2012-5068: ScriptEngine corrected permissions

- S7158796, CVE-2012-5070: Tighten properties checking in EnvHelp

- S7158807: Revise stack management with volatile call sites

- S7163198, CVE-2012-5076: Tightened package accessibility

- S7167656, CVE-2012-5077: Multiple Seeders are being created

- S7169884, CVE-2012-5073: LogManager checks do not work correctly for sub-types

- S7169887, CVE-2012-5074: Tightened package accessibility

- S7169888, CVE-2012-5075: Narrowing resource definitions in JMX RMI connector

- S7172522, CVE-2012-5072: Improve DomainCombiner checking

- S7186286, CVE-2012-5081: TLS implementation to better adhere to RFC

- S7189103, CVE-2012-5069: Executors needs to maintain state

- S7189490: More improvements to DomainCombiner checking

- S7189567, CVE-2012-5085: java net obselete protocol

- S7192975, CVE-2012-5071: Issue with JMX reflection

- S7195194, CVE-2012-5084: Better data validation for Swing

- S7195549, CVE-2012-5087: Better bean object persistence

- S7195917, CVE-2012-5086: XMLDecoder parsing at close-time should be improved

- S7195919, CVE-2012-5079: (sl) ServiceLoader can throw CCE without needing to create instance

- S7196190, CVE-2012-5088: Improve method of handling MethodHandles

- S7198296, CVE-2012-5089: Refactor classloader usage

- S7158800: Improve storage of symbol tables

- S7158801: Improve VM CompileOnly option

- S7158804: Improve config file parsing

- S7198606, CVE-2012-4416: Improve VM optimization

- Bug fixes

- Remove merge artefact.


Update the affected java-1_7_0-openjdk packages.

See Also

Plugin Details

Severity: Critical

ID: 74793

File Name: openSUSE-2012-749.nasl

Version: $Revision: 1.4 $

Type: local

Agent: unix

Published: 2014/06/13

Modified: 2018/01/03

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:java-1_7_0-openjdk, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-debugsource, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-demo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-demo-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-devel, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-devel-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-javadoc, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-src, cpe:/o:novell:opensuse:12.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/10/23

Exploitable With


Core Impact

Metasploit (Java Applet Method Handle Remote Code Execution)

Reference Information

CVE: CVE-2012-3216, CVE-2012-4416, CVE-2012-5068, CVE-2012-5069, CVE-2012-5070, CVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5074, CVE-2012-5075, CVE-2012-5076, CVE-2012-5077, CVE-2012-5079, CVE-2012-5081, CVE-2012-5084, CVE-2012-5085, CVE-2012-5086, CVE-2012-5087, CVE-2012-5088, CVE-2012-5089

OSVDB: 86344, 86345, 86346, 86347, 86348, 86349, 86350, 86351, 86352, 86353, 86354, 86355, 86356, 86357, 86358, 86359, 86360, 86361, 86362, 86363, 86364, 86365, 86366, 86367, 86368, 86369, 86370, 86371, 86372, 86374