openSUSE Security Update : java-1_6_0-openjdk (openSUSE-SU-2012:1424-1) (ROBOT)

critical Nessus Plugin ID 74800

Synopsis

The remote openSUSE host is missing a security update.

Description

java 1.6.0 openjdk / icedtea was updated to 1.11.5 (bnc#785433)

- Security fixes

- S6631398, CVE-2012-3216: FilePermission improved path checking

- S7093490: adjust package access in rmiregistry

- S7143535, CVE-2012-5068: ScriptEngine corrected permissions

- S7167656, CVE-2012-5077: Multiple Seeders are being created

- S7169884, CVE-2012-5073: LogManager checks do not work correctly for sub-types

- S7169888, CVE-2012-5075: Narrowing resource definitions in JMX RMI connector

- S7172522, CVE-2012-5072: Improve DomainCombiner checking

- S7186286, CVE-2012-5081: TLS implementation to better adhere to RFC

- S7189103, CVE-2012-5069: Executors needs to maintain state

- S7189490: More improvements to DomainCombiner checking

- S7189567, CVE-2012-5085: java net obselete protocol

- S7192975, CVE-2012-5071: Conditional usage check is wrong

- S7195194, CVE-2012-5084: Better data validation for Swing

- S7195917, CVE-2012-5086: XMLDecoder parsing at close-time should be improved

- S7195919, CVE-2012-5079: (sl) ServiceLoader can throw CCE without needing to create instance

- S7198296, CVE-2012-5089: Refactor classloader usage

- S7158800: Improve storage of symbol tables

- S7158801: Improve VM CompileOnly option

- S7158804: Improve config file parsing

- S7176337: Additional changes needed for 7158801 fix

- S7198606, CVE-2012-4416: Improve VM optimization

- Backports

- S7175845: 'jar uf' changes file permissions unexpectedly

- S7177216: native2ascii changes file permissions of input file

- S7199153: TEST_BUG: try-with-resources syntax pushed to 6-open repo

- Bug fixes

- PR1194: IcedTea tries to build with /usr/lib/jvm/java-openjdk (now a 1.7 VM) by default

Solution

Update the affected java-1_6_0-openjdk packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=785433

https://lists.opensuse.org/opensuse-updates/2012-10/msg00100.html

Plugin Details

Severity: Critical

ID: 74800

File Name: openSUSE-2012-755.nasl

Version: 1.7

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:novell:opensuse:11.4, p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-demo-debuginfo, p-cpe:/a:novell:opensuse:java-1_6_0-openjdk, p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-devel, p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-devel-debuginfo, p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-debugsource, p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-demo, p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-src, p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-debuginfo, p-cpe:/a:novell:opensuse:java-1_6_0-openjdk-javadoc

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/25/2012

Vulnerability Publication Date: 10/16/2012

Reference Information

CVE: CVE-2012-3216, CVE-2012-4416, CVE-2012-5068, CVE-2012-5069, CVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5077, CVE-2012-5079, CVE-2012-5081, CVE-2012-5084, CVE-2012-5085, CVE-2012-5086, CVE-2012-5089