Language:
https://security-tracker.debian.org/tracker/CVE-2012-1711
https://security-tracker.debian.org/tracker/CVE-2012-1719
https://security-tracker.debian.org/tracker/CVE-2012-1713
https://security-tracker.debian.org/tracker/CVE-2012-1716
https://security-tracker.debian.org/tracker/CVE-2012-1717
https://security-tracker.debian.org/tracker/CVE-2012-1718
https://security-tracker.debian.org/tracker/CVE-2012-1723
https://security-tracker.debian.org/tracker/CVE-2012-1725
https://security-tracker.debian.org/tracker/CVE-2012-1724
Severity: Critical
ID: 59839
File Name: debian_DSA-2507.nasl
Version: 1.19
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 7/5/2012
Updated: 3/8/2022
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:debian:debian_linux:openjdk-6, cpe:/o:debian:debian_linux:6.0
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/4/2012
CISA Known Exploited Vulnerability Due Dates: 3/24/2022
Core Impact
Metasploit (Java Applet Field Bytecode Verifier Cache Remote Code Execution)
CVE: CVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1723, CVE-2012-1724, CVE-2012-1725
BID: 53946, 53947, 53949, 53950, 53951, 53952, 53954, 53958, 53960
DSA: 2507