RHEL 5 / 6 : java-1.7.0-oracle (RHSA-2013:0963)

low Nessus Plugin ID 66948

Synopsis

The remote Red Hat host is missing one or more security updates for java-1.7.0-oracle.

Description

The remote Redhat Enterprise Linux 5 / 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2013:0963 advisory.

- OpenJDK: Insecure shared memory permissions (2D, 8001034) (CVE-2013-1500)

- OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) (CVE-2013-1571)

- Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment) (CVE-2013-2400, CVE-2013-2437, CVE-2013-2442, CVE-2013-2462, CVE-2013-2466, CVE-2013-2468, CVE-2013-3744)

- OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) (CVE-2013-2407)

- OpenJDK: JConsole SSL support (Serviceability, 8003703) (CVE-2013-2412)

- OpenJDK: AccessControlContext check order issue (Libraries, 8001330) (CVE-2013-2443)

- OpenJDK: Resource denial of service (AWT, 8001038) (CVE-2013-2444)

- OpenJDK: Better handling of memory allocation errors (Hotspot, 7158805) (CVE-2013-2445)

- OpenJDK: output stream access restrictions (CORBA, 8000642) (CVE-2013-2446)

- OpenJDK: Prevent revealing the local address (Networking, 8001318) (CVE-2013-2447)

- OpenJDK: Better access restrictions (Sound, 8006328) (CVE-2013-2448)

- OpenJDK: GnomeFileTypeDetector path access check (Libraries, 8004288) (CVE-2013-2449)

- OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) (CVE-2013-2450)

- OpenJDK: exclusive port binding (Networking, 7170730) (CVE-2013-2451)

- OpenJDK: Unique VMIDs (Libraries, 8001033) (CVE-2013-2452)

- OpenJDK: MBeanServer Introspector package access (JMX, 8008124) (CVE-2013-2453)

- OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) (CVE-2013-2454)

- OpenJDK: getEnclosing* checks (Libraries, 8007812) (CVE-2013-2455)

- OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) (CVE-2013-2456)

- OpenJDK: Proper class checking (JMX, 8008120) (CVE-2013-2457)

- OpenJDK: Method handles (Libraries, 8009424) (CVE-2013-2458)

- OpenJDK: Various AWT integer overflow checks (AWT, 8009071) (CVE-2013-2459)

- OpenJDK: tracing insufficient access checks (Serviceability, 8010209) (CVE-2013-2460)

- OpenJDK: Missing check for valid DOMCanonicalizationMethod canonicalization algorithm (Libraries, 8014281) (CVE-2013-2461)

- OpenJDK: Incorrect image attribute verification (2D, 8012438) (CVE-2013-2463)

- Oracle JDK: unspecified vulnerability fixed in 7u25 (2D) (CVE-2013-2464)

- OpenJDK: Incorrect image channel verification (2D, 8012597) (CVE-2013-2465)

- OpenJDK: Incorrect image layout verification (2D, 8012601) (CVE-2013-2469)

- OpenJDK: ImagingLib byte lookup processing (2D, 8011243) (CVE-2013-2470)

- OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) (CVE-2013-2471)

- OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) (CVE-2013-2472)

- OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) (CVE-2013-2473)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL java-1.7.0-oracle package based on the guidance in RHSA-2013:0963.

See Also

http://www.nessus.org/u?a094a6d7

http://www.nessus.org/u?f3d70905

https://access.redhat.com/errata/RHSA-2013:0963

https://access.redhat.com/security/updates/classification/#critical

https://bugzilla.redhat.com/show_bug.cgi?id=973474

https://bugzilla.redhat.com/show_bug.cgi?id=975099

https://bugzilla.redhat.com/show_bug.cgi?id=975102

https://bugzilla.redhat.com/show_bug.cgi?id=975107

https://bugzilla.redhat.com/show_bug.cgi?id=975110

https://bugzilla.redhat.com/show_bug.cgi?id=975115

https://bugzilla.redhat.com/show_bug.cgi?id=975118

https://bugzilla.redhat.com/show_bug.cgi?id=975120

https://bugzilla.redhat.com/show_bug.cgi?id=975121

https://bugzilla.redhat.com/show_bug.cgi?id=975122

https://bugzilla.redhat.com/show_bug.cgi?id=975124

https://bugzilla.redhat.com/show_bug.cgi?id=975125

https://bugzilla.redhat.com/show_bug.cgi?id=975126

https://bugzilla.redhat.com/show_bug.cgi?id=975127

https://bugzilla.redhat.com/show_bug.cgi?id=975129

https://bugzilla.redhat.com/show_bug.cgi?id=975130

https://bugzilla.redhat.com/show_bug.cgi?id=975131

https://bugzilla.redhat.com/show_bug.cgi?id=975132

https://bugzilla.redhat.com/show_bug.cgi?id=975133

https://bugzilla.redhat.com/show_bug.cgi?id=975134

https://bugzilla.redhat.com/show_bug.cgi?id=975137

https://bugzilla.redhat.com/show_bug.cgi?id=975138

https://bugzilla.redhat.com/show_bug.cgi?id=975139

https://bugzilla.redhat.com/show_bug.cgi?id=975140

https://bugzilla.redhat.com/show_bug.cgi?id=975141

https://bugzilla.redhat.com/show_bug.cgi?id=975142

https://bugzilla.redhat.com/show_bug.cgi?id=975144

https://bugzilla.redhat.com/show_bug.cgi?id=975145

https://bugzilla.redhat.com/show_bug.cgi?id=975146

https://bugzilla.redhat.com/show_bug.cgi?id=975148

https://bugzilla.redhat.com/show_bug.cgi?id=975757

https://bugzilla.redhat.com/show_bug.cgi?id=975761

https://bugzilla.redhat.com/show_bug.cgi?id=975764

https://bugzilla.redhat.com/show_bug.cgi?id=975769

https://bugzilla.redhat.com/show_bug.cgi?id=975770

https://bugzilla.redhat.com/show_bug.cgi?id=975773

https://bugzilla.redhat.com/show_bug.cgi?id=975774

https://bugzilla.redhat.com/show_bug.cgi?id=975775

Plugin Details

Severity: Low

ID: 66948

File Name: redhat-RHSA-2013-0963.nasl

Version: 1.27

Type: local

Agent: unix

Published: 6/21/2013

Updated: 4/21/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

Vendor

Vendor Severity: Critical

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-2473

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2013-1571

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-oracle, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-oracle-jdbc, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-oracle-src, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-oracle-devel, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-oracle-plugin, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-oracle-javafx

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/20/2013

CISA Known Exploited Vulnerability Due Dates: 4/18/2022

Exploitable With

Core Impact

Metasploit (Java storeImageArray() Invalid Array Indexing Vulnerability)

Reference Information

CVE: CVE-2013-1500, CVE-2013-1571, CVE-2013-2400, CVE-2013-2407, CVE-2013-2412, CVE-2013-2437, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444, CVE-2013-2445, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2449, CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458, CVE-2013-2459, CVE-2013-2460, CVE-2013-2461, CVE-2013-2462, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473, CVE-2013-3744

CWE: 190

RHSA: 2013:0963