Language:
https://security-tracker.debian.org/tracker/CVE-2011-3389
https://security-tracker.debian.org/tracker/CVE-2011-3521
https://security-tracker.debian.org/tracker/CVE-2011-3544
https://security-tracker.debian.org/tracker/CVE-2011-3547
https://security-tracker.debian.org/tracker/CVE-2011-3548
https://security-tracker.debian.org/tracker/CVE-2011-3551
https://security-tracker.debian.org/tracker/CVE-2011-3552
https://security-tracker.debian.org/tracker/CVE-2011-3553
https://security-tracker.debian.org/tracker/CVE-2011-3554
https://security-tracker.debian.org/tracker/CVE-2011-3556
https://security-tracker.debian.org/tracker/CVE-2011-3557
https://security-tracker.debian.org/tracker/CVE-2011-3560
Severity: Critical
ID: 56987
File Name: debian_DSA-2356.nasl
Version: 1.28
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 12/2/2011
Updated: 12/5/2022
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:debian:debian_linux:openjdk-6, cpe:/o:debian:debian_linux:6.0
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/1/2011
CISA Known Exploited Vulnerability Due Dates: 3/24/2022
CANVAS (CANVAS)
Core Impact
Metasploit (Java RMI Server Insecure Default Configuration Java Code Execution)
CVE: CVE-2011-3389, CVE-2011-3521, CVE-2011-3544, CVE-2011-3547, CVE-2011-3548, CVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560
BID: 49388, 49778, 50211, 50215, 50216, 50218, 50224, 50231, 50234, 50236, 50243, 50246, 50248
DSA: 2356