openSUSE Security Update : java-1_7_0-openjdk (openSUSE-SU-2013:0745-1)

critical Nessus Plugin ID 74990
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

- apply aarch64 patches on openSUSE 12.3+, EM_AARCH64 is not defined in earlier releases

- update to icedtea-2.3.9 (bnc#816720)

- Security fixes

- S6657673, CVE-2013-1518: Issues with JAXP

- S7200507: Refactor Introspector internals

- S8000724, CVE-2013-2417: Improve networking serialization

- S8001031, CVE-2013-2419: Better font processing

- S8001040, CVE-2013-1537: Rework RMI model

- S8001322: Refactor deserialization

- S8001329, CVE-2013-1557: Augment RMI logging

- S8003335: Better handling of Finalizer thread

- S8003445: Adjust JAX-WS to focus on API

- S8003543, CVE-2013-2415: Improve processing of MTOM attachments

- S8004261: Improve input validation

- S8004336, CVE-2013-2431: Better handling of method handle intrinsic frames

- S8004986, CVE-2013-2383: Better handling of glyph table

- S8004987, CVE-2013-2384: Improve font layout

- S8004994, CVE-2013-1569: Improve checking of glyph table

- S8005432: Update access to JAX-WS

- S8005943: (process) Improved Runtime.exec

- S8006309: More reliable control panel operation

- S8006435, CVE-2013-2424: Improvements in JMX

- S8006790: Improve checking for windows

- S8006795: Improve font warning messages

- S8007406: Improve accessibility of AccessBridge

- S8007617, CVE-2013-2420: Better validation of images

- S8007667, CVE-2013-2430: Better image reading

- S8007918, CVE-2013-2429: Better image writing

- S8008140: Better method handle resolution

- S8009049, CVE-2013-2436: Better method handle binding

- S8009063, CVE-2013-2426: Improve reliability of ConcurrentHashMap

- S8009305, CVE-2013-0401: Improve AWT data transfer

- S8009677, CVE-2013-2423: Better setting of setters

- S8009699, CVE-2013-2421: Methodhandle lookup

- S8009814, CVE-2013-1488: Better driver management

- S8009857, CVE-2013-2422: Problem with plugin

- Backports

- S7130662, RH928500: GTK file dialog crashes with a NPE

- Bug fixes

- PR1363: Fedora 19 / rawhide FTBFS SIGILL

- PR1401: Fix Zero build on 2.3.8

- Fix offset problem in ICU LETableReference.

- Change -Werror fix to preserve OpenJDK default.

- PR1303: Correct #ifdef to #if

- PR1404: Failure to bootstrap with ecj 4.2

- Added url as source. Please see http://en.opensuse.org/SourceUrls

- icedtea-2.3.8-zero-patches.patch: remove patch not applicable to zero compatible hotspot

- java-1.7.0-openjdk-fork.patch: Add support for architectures without fork syscall

- java-1.7.0-openjdk-aarch64.patch: Add support for aarch64

Solution

Update the affected java-1_7_0-openjdk packages.

See Also

https://en.opensuse.org/SourceUrls

https://bugzilla.novell.com/show_bug.cgi?id=816720

https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html

Plugin Details

Severity: Critical

ID: 74990

File Name: openSUSE-2013-402.nasl

Version: 1.7

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:java-1_7_0-openjdk, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-debugsource, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-demo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-demo-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-devel, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-devel-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-javadoc, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-src, cpe:/o:novell:opensuse:12.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/24/2013

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Java Applet Reflection Type Confusion Remote Code Execution)

Reference Information

CVE: CVE-2013-0401, CVE-2013-1488, CVE-2013-1518, CVE-2013-1537, CVE-2013-1557, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2415, CVE-2013-2417, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2426, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431, CVE-2013-2436

BID: 58504, 58507, 59131, 59141, 59153, 59159, 59162, 59165, 59166, 59167, 59170, 59179, 59184, 59187, 59190, 59194, 59206, 59212, 59213, 59228, 59243