Oracle Java SE Multiple Vulnerabilities (October 2013 CPU)

critical Nessus Plugin ID 70472

Synopsis

The remote Windows host contains a programming platform that is potentially affected by multiple vulnerabilities.

Description

The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier than 7 Update 45, 6 Update 65, or 5 Update 55. It is, therefore, potentially affected by security issues in the following components :

- 2D
- AWT
- BEANS
- CORBA
- Deployment
- JAX-WS
- JAXP
- JGSS
- jhat
- JNDI
- JavaFX
- Javadoc
- Libraries
- SCRIPTING
- Security
- Swing

Solution

Update to JDK / JRE 7 Update 45, 6 Update 65, or 5 Update 55 or later and, if necessary, remove any affected versions.

Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 5 Update 55 or later or 6 Update 65 or later.

See Also

http://www.oracle.com/technetwork/java/eol-135779.html

http://www.zerodayinitiative.com/advisories/ZDI-13-244/

http://www.zerodayinitiative.com/advisories/ZDI-13-245/

http://www.zerodayinitiative.com/advisories/ZDI-13-246/

http://www.zerodayinitiative.com/advisories/ZDI-13-247/

http://www.zerodayinitiative.com/advisories/ZDI-13-248/

http://www.nessus.org/u?94fd7b37

Plugin Details

Severity: Critical

ID: 70472

File Name: oracle_java_cpu_oct_2013.nasl

Version: 1.16

Type: local

Agent: windows

Family: Windows

Published: 10/17/2013

Updated: 12/19/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.8

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-5782

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:jdk, cpe:/a:oracle:jre

Required KB Items: installed_sw/Java

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/15/2013

Vulnerability Publication Date: 10/15/2013

Reference Information

CVE: CVE-2013-3829, CVE-2013-4002, CVE-2013-5772, CVE-2013-5774, CVE-2013-5775, CVE-2013-5776, CVE-2013-5777, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5787, CVE-2013-5788, CVE-2013-5789, CVE-2013-5790, CVE-2013-5797, CVE-2013-5800, CVE-2013-5801, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5805, CVE-2013-5806, CVE-2013-5809, CVE-2013-5810, CVE-2013-5812, CVE-2013-5814, CVE-2013-5817, CVE-2013-5818, CVE-2013-5819, CVE-2013-5820, CVE-2013-5823, CVE-2013-5824, CVE-2013-5825, CVE-2013-5829, CVE-2013-5830, CVE-2013-5831, CVE-2013-5832, CVE-2013-5838, CVE-2013-5840, CVE-2013-5842, CVE-2013-5843, CVE-2013-5844, CVE-2013-5846, CVE-2013-5848, CVE-2013-5849, CVE-2013-5850, CVE-2013-5851, CVE-2013-5852, CVE-2013-5854

BID: 58507, 59167, 59170, 59184, 59187, 59194, 59243, 60617, 60618, 60619, 60620, 60622, 60623, 60627, 60629, 60632, 60633, 60634, 60635, 60638, 60639, 60640, 60641, 60644, 60645, 60646, 60647, 60650, 60651, 60652, 60653, 60655, 60656, 60657, 60658, 60659, 63082, 63089, 63095, 63098, 63101, 63102, 63103, 63106, 63110, 63111, 63115, 63118, 63120, 63121, 63124, 63126, 63128, 63129, 63131, 63133, 63134, 63135, 63137, 63139, 63141, 63142, 63143, 63145, 63146, 63147, 63148, 63149, 63150, 63151, 63152, 63153, 63154, 63155, 63156, 63157, 63158, 59206, 59212, 59213, 59219, 59228, 60621, 60624, 60625, 60630, 60631, 60637, 60643, 60654, 61310, 60626, 59141, 59153, 59165, 63112, 63122, 60649, 63136, 63127, 63130, 63079, 63144, 63140, 63132