openSUSE Security Update : java-1_7_0-openjdk (openSUSE-SU-2013:1288-1)

critical Nessus Plugin ID 75101
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote openSUSE host is missing a security update.


java-1_7_0-openjdk was updated to icedtea-2.4.1 (bnc#828665)

- Security fixes

- S6741606, CVE-2013-2407: Integrate Apache Santuario

- S7158805, CVE-2013-2445: Better rewriting of nested subroutine calls

- S7170730, CVE-2013-2451: Improve Windows network stack support.

- S8000638, CVE-2013-2450: Improve deserialization

- S8000642, CVE-2013-2446: Better handling of objects for transportation

- S8001032: Restrict object access

- S8001033, CVE-2013-2452: Refactor network address handling in virtual machine identifiers

- S8001034, CVE-2013-1500: Memory management improvements

- S8001038, CVE-2013-2444: Resourcefully handle resources

- S8001043: Clarify definition restrictions

- S8001308: Update display of applet windows

- S8001309: Better handling of annotation interfaces

- S8001318, CVE-2013-2447: Socket.getLocalAddress not consistent with InetAddress.getLocalHost

- S8001330, CVE-2013-2443: Improve on checking order (non-Zero builds only)

- S8003703, CVE-2013-2412: Update RMI connection dialog box

- S8004288, CVE-2013-2449: (fs) Files.probeContentType problems

- S8004584: Augment applet contextualization

- S8005007: Better glyph processing

- S8006328, CVE-2013-2448: Improve robustness of sound classes

- S8006611: Improve scripting

- S8007467: Improve robustness of JMX internal APIs

- S8007471: Improve MBean notifications

- S8007812, CVE-2013-2455: (reflect) Class.getEnclosingMethod problematic for some classes

- S8007925: Improve cmsStageAllocLabV2ToV4curves

- S8007926: Improve cmsPipelineDup

- S8007927: Improve cmsAllocProfileSequenceDescription

- S8007929: Improve CurvesAlloc

- S8008120, CVE-2013-2457: Improve JMX class checking

- S8008124, CVE-2013-2453: Better compliance testing

- S8008128: Better API coherence for JMX

- S8008132, CVE-2013-2456: Better serialization support

- S8008585: Better JMX data handling

- S8008593: Better URLClassLoader resource management

- S8008603: Improve provision of JMX providers

- S8008607: Better input checking in JMX

- S8008611: Better handling of annotations in JMX

- S8008615: Improve robustness of JMX internal APIs

- S8008623: Better handling of MBeanServers

- S8008744, CVE-2013-2407: Rework part of fix for JDK-6741606

- S8008982: Adjust JMX for underlying interface changes

- S8009004: Better implementation of RMI connections

- S8009008: Better manage management-api

- S8009013: Better handling of T2K glyphs

- S8009034: Improve resulting notifications in JMX

- S8009038: Improve JMX notification support

- S8009057, CVE-2013-2448: Improve MIDI event handling

- S8009067: Improve storing keys in KeyStore

- S8009071, CVE-2013-2459: Improve shape handling

- S8009235: Improve handling of TSA data

- S8009424, CVE-2013-2458: Adapt Nashorn to JSR-292 implementation change

- S8009554, CVE-2013-2454: Improve SerialJavaObject.getFields

- S8009654: Improve stability of cmsnamed

- S8010209, CVE-2013-2460: Better provision of factories

- S8011243, CVE-2013-2470: Improve ImagingLib

- S8011248, CVE-2013-2471: Better Component Rasters

- S8011253, CVE-2013-2472: Better Short Component Rasters

- S8011257, CVE-2013-2473: Better Byte Component Rasters

- S8012375, CVE-2013-1571: Improve Javadoc framing

- S8012421: Better positioning of PairPositioning

- S8012438, CVE-2013-2463: Better image validation

- S8012597, CVE-2013-2465: Better image channel verification

- S8012601, CVE-2013-2469: Better validation of image layouts

- S8014281, CVE-2013-2461: Better checking of XML signature

- S8015997: Additional improvement in Javadoc framing

- OpenJDK

- list to long, please consult NEWS file

- java-1.7.0-openjdk-zero-arch.patch: fix detection of zero arch

- ignore rhino dependencies during a build to prevent a build cycle

- update to icedtea-2.4.0 (based on oracle jdk7u40)

- OpenJDK (see NEWS for full listing)

- PR1209, S7170638: Use DTRACE_PROBE[N] in JNI Set and SetStatic Field.

- PR1206, S7201205: Add Makefile configuration option to build with unlimited crypto in OpenJDK

- Backports

- PR1197, S8003120, RH868136:
ResourceManager.getApplicationResources() does not close InputStreams

- S8014618, RH962568: Need to strip leading zeros in TlsPremasterSecret of DHKeyAgreement

- Bug fixes

- PR1212: IcedTea7 fails to build because Resources.getText() is no longer available for code to use

- Add NSS (commented out) to other platforms.

- Allow multiple PKCS11 library initialisation to be a non-critical error.

- Complete switch from local zlib patch to upstream version.

- Include defs.make in buildtree.make so ZERO_BUILD is recognised and JVM_VARIANT_ZERO set.

- Provide support for using PKCS11 provider with NSS

- Remove file apparently removed as part of upstreaming of Zero.

- Revert 7060849

- Set UNLIMITED_CRYPTO=true to ensure we use the unlimited policy.

- PR473: Set handleStartupErrors to ignoreMultipleInitialisation in nss.cfg

- PR716: IcedTea7 should bootstrap with IcedTea6

- Expand* imports to avoid conflict when building with OpenJDK 6.

- Fix indentation on Makefile block not executed when STRIP_POLICY=no_strip is set

- Fix invalid XSL stylesheets and DTD introduced as part of JEP 167.

- Include defs.make in buildtree.make so ZERO_BUILD is recognised and JVM_VARIANT_ZERO set.

- Make sure libffi cflags and libs are used.

- PR1378: Add AArch64 support to Zero

- PR1170: Ensure unlimited crypto policy is in place.

- RH513605, PR1280: Updating/Installing OpenJDK should recreate the shared class-data archive

- PR1358: Make XRender mandatory

- PR1360: Check for /usr/lib64 JVMs and generic JPackage alternative

- PR1435, D657854: OpenJDK 7 returns incorrect TrueType font metrics

- PR728: GTKLookAndFeel does not honor gtk-alternative-button-order

- JamVM

- JSR 335: (lambda expressions) initial hack

- JEP 171: Implement fence methods in sun.misc.Unsafe

- Fix invokesuper check in invokespecial opcode

- Fix non-direct interpreter invokespecial super-class check

- When GC'ing a native method don't try to free code

- Do not free unprepared Miranda method code data

- Set anonymous class protection domain

- JVM_IsVMGeneratedMethodIx stub

- Dummy implementation of sun.misc.Perf natives

- separate vm for zero is no longer needed

- drop java-1.7.0-openjdk-aarch64.patch (upstream: PR1378)

- fix bnc#781690c#11 - setup JAVA_HOME in posttrans, so certificates will be created by this JVM

- fix the postrans conditions (add missing prefiX)

- relax build requires, so every java-devel >= 1.7.0 can match


Update the affected java-1_7_0-openjdk packages.

See Also

Plugin Details

Severity: Critical

ID: 75101

File Name: openSUSE-2013-622.nasl

Version: 1.4

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Critical

Score: 9.8


Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:java-1_7_0-openjdk, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-debugsource, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-demo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-demo-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-devel, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-devel-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-javadoc, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-src, cpe:/o:novell:opensuse:12.2, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/24/2013

Exploitable With

Core Impact

Metasploit (Java storeImageArray() Invalid Array Indexing Vulnerability)

Reference Information

CVE: CVE-2013-1500, CVE-2013-1571, CVE-2013-2407, CVE-2013-2412, CVE-2013-2443, CVE-2013-2444, CVE-2013-2445, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2449, CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458, CVE-2013-2459, CVE-2013-2460, CVE-2013-2461, CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473