Language:
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.nessus.org/u?fceae64d
https://access.redhat.com/errata/RHSA-2011:0880
https://access.redhat.com/security/updates/classification/#low
https://bugzilla.redhat.com/show_bug.cgi?id=533125
https://bugzilla.redhat.com/show_bug.cgi?id=582466
https://bugzilla.redhat.com/show_bug.cgi?id=642187
https://bugzilla.redhat.com/show_bug.cgi?id=642202
https://bugzilla.redhat.com/show_bug.cgi?id=642215
https://bugzilla.redhat.com/show_bug.cgi?id=642558
https://bugzilla.redhat.com/show_bug.cgi?id=642559
https://bugzilla.redhat.com/show_bug.cgi?id=642573
https://bugzilla.redhat.com/show_bug.cgi?id=642576
https://bugzilla.redhat.com/show_bug.cgi?id=639876
https://bugzilla.redhat.com/show_bug.cgi?id=639897
https://bugzilla.redhat.com/show_bug.cgi?id=639904
https://bugzilla.redhat.com/show_bug.cgi?id=639909
https://bugzilla.redhat.com/show_bug.cgi?id=639920
https://bugzilla.redhat.com/show_bug.cgi?id=639922
https://bugzilla.redhat.com/show_bug.cgi?id=639925
https://bugzilla.redhat.com/show_bug.cgi?id=642167
https://bugzilla.redhat.com/show_bug.cgi?id=642180
https://bugzilla.redhat.com/show_bug.cgi?id=642585
https://bugzilla.redhat.com/show_bug.cgi?id=642589
https://bugzilla.redhat.com/show_bug.cgi?id=642593
https://bugzilla.redhat.com/show_bug.cgi?id=642611
https://bugzilla.redhat.com/show_bug.cgi?id=674336
https://bugzilla.redhat.com/show_bug.cgi?id=675984
https://bugzilla.redhat.com/show_bug.cgi?id=676019
https://bugzilla.redhat.com/show_bug.cgi?id=676023
https://bugzilla.redhat.com/show_bug.cgi?id=677957
https://bugzilla.redhat.com/show_bug.cgi?id=677958
https://bugzilla.redhat.com/show_bug.cgi?id=677959
https://bugzilla.redhat.com/show_bug.cgi?id=677960
https://bugzilla.redhat.com/show_bug.cgi?id=677961
https://bugzilla.redhat.com/show_bug.cgi?id=677963
https://bugzilla.redhat.com/show_bug.cgi?id=677966
https://bugzilla.redhat.com/show_bug.cgi?id=677967
https://bugzilla.redhat.com/show_bug.cgi?id=677968
Severity: Critical
ID: 63983
File Name: redhat-RHSA-2011-0880.nasl
Version: 1.15
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 1/24/2013
Updated: 4/21/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.8
Vendor Severity: Low
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2010-4473
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2009-3555
CPE: cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/16/2011
CANVAS (CANVAS)
Core Impact
Metasploit (Sun Java Applet2ClassLoader Remote Code Execution)
CVE: CVE-2009-3555, CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557, CVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574, CVE-2010-4422, CVE-2010-4447, CVE-2010-4448, CVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463, CVE-2010-4465, CVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4471, CVE-2010-4473, CVE-2010-4475, CVE-2010-4476
BID: 46091, 46386, 46388, 46391, 46393, 46394, 46395, 46398, 46399, 46402, 46403, 46406, 46409, 46410, 46411, 43965, 43971, 43979, 43985, 43988, 43999, 44009, 44011, 44012, 44014, 44016, 44017, 44021, 44024, 44027, 44028, 44030, 44032, 44035, 44038, 44040