SuSE 11.3 Security Update : java-1_7_0-openjdk (SAT Patch Number 10621)

critical Nessus Plugin ID 83287
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

OpenJDK was updated to version 2.5.5 - OpenJDK 7u79 to fix security issues and bugs.

The following vulnerabilities have been fixed :

- Deployment: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
(CVE-2015-0458)

- 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols. (CVE-2015-0459)

- Hotspot: unauthenticated remote attackers could execute arbitrary code via multiple protocols. (CVE-2015-0460)

- 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols. (CVE-2015-0469)

- Beans: unauthenticated remote attackers could update, insert or delete some JAVA accessible data via multiple protocols. (CVE-2015-0477)

- JCE: unauthenticated remote attackers could read some JAVA accessible data via multiple protocols.
(CVE-2015-0478)

- Tools: unauthenticated remote attackers could update, insert or delete some JAVA accessible data via multiple protocols and cause a partial denial of service (partial DOS). (CVE-2015-0480)

- JavaFX: unauthenticated remote attackers could read, update, insert or delete access some Java accessible data via multiple protocols and cause a partial denial of service (partial DOS). (CVE-2015-0484)

- JSSE: unauthenticated remote attackers could cause a partial denial of service (partial DOS). (CVE-2015-0488)

- 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols. (CVE-2015-0491)

- JavaFX: unauthenticated remote attackers could execute arbitrary code via multiple protocols. (CVE-2015-0492)

Solution

Apply SAT patch number 10621.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=927591

http://support.novell.com/security/cve/CVE-2015-0458.html

http://support.novell.com/security/cve/CVE-2015-0459.html

http://support.novell.com/security/cve/CVE-2015-0460.html

http://support.novell.com/security/cve/CVE-2015-0469.html

http://support.novell.com/security/cve/CVE-2015-0477.html

http://support.novell.com/security/cve/CVE-2015-0478.html

http://support.novell.com/security/cve/CVE-2015-0480.html

http://support.novell.com/security/cve/CVE-2015-0484.html

http://support.novell.com/security/cve/CVE-2015-0488.html

http://support.novell.com/security/cve/CVE-2015-0491.html

http://support.novell.com/security/cve/CVE-2015-0492.html

Plugin Details

Severity: Critical

ID: 83287

File Name: suse_11_java-1_7_0-openjdk-150419.nasl

Version: 2.2

Type: local

Agent: unix

Published: 5/8/2015

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:java-1_7_0-openjdk, p-cpe:/a:novell:suse_linux:11:java-1_7_0-openjdk-demo, p-cpe:/a:novell:suse_linux:11:java-1_7_0-openjdk-devel, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 4/19/2015

Reference Information

CVE: CVE-2015-0458, CVE-2015-0459, CVE-2015-0460, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0484, CVE-2015-0488, CVE-2015-0491, CVE-2015-0492