openSUSE Security Update : java-1_7_0-openjdk (openSUSE-SU-2013:0745-1)

critical Nessus Plugin ID 74990

Synopsis

The remote openSUSE host is missing a security update.

Description

- apply aarch64 patches on openSUSE 12.3+, EM_AARCH64 is not defined in earlier releases

- update to icedtea-2.3.9 (bnc#816720)

- Security fixes

- S6657673, CVE-2013-1518: Issues with JAXP

- S7200507: Refactor Introspector internals

- S8000724, CVE-2013-2417: Improve networking serialization

- S8001031, CVE-2013-2419: Better font processing

- S8001040, CVE-2013-1537: Rework RMI model

- S8001322: Refactor deserialization

- S8001329, CVE-2013-1557: Augment RMI logging

- S8003335: Better handling of Finalizer thread

- S8003445: Adjust JAX-WS to focus on API

- S8003543, CVE-2013-2415: Improve processing of MTOM attachments

- S8004261: Improve input validation

- S8004336, CVE-2013-2431: Better handling of method handle intrinsic frames

- S8004986, CVE-2013-2383: Better handling of glyph table

- S8004987, CVE-2013-2384: Improve font layout

- S8004994, CVE-2013-1569: Improve checking of glyph table

- S8005432: Update access to JAX-WS

- S8005943: (process) Improved Runtime.exec

- S8006309: More reliable control panel operation

- S8006435, CVE-2013-2424: Improvements in JMX

- S8006790: Improve checking for windows

- S8006795: Improve font warning messages

- S8007406: Improve accessibility of AccessBridge

- S8007617, CVE-2013-2420: Better validation of images

- S8007667, CVE-2013-2430: Better image reading

- S8007918, CVE-2013-2429: Better image writing

- S8008140: Better method handle resolution

- S8009049, CVE-2013-2436: Better method handle binding

- S8009063, CVE-2013-2426: Improve reliability of ConcurrentHashMap

- S8009305, CVE-2013-0401: Improve AWT data transfer

- S8009677, CVE-2013-2423: Better setting of setters

- S8009699, CVE-2013-2421: Methodhandle lookup

- S8009814, CVE-2013-1488: Better driver management

- S8009857, CVE-2013-2422: Problem with plugin

- Backports

- S7130662, RH928500: GTK file dialog crashes with a NPE

- Bug fixes

- PR1363: Fedora 19 / rawhide FTBFS SIGILL

- PR1401: Fix Zero build on 2.3.8

- Fix offset problem in ICU LETableReference.

- Change -Werror fix to preserve OpenJDK default.

- PR1303: Correct #ifdef to #if

- PR1404: Failure to bootstrap with ecj 4.2

- Added url as source. Please see http://en.opensuse.org/SourceUrls

- icedtea-2.3.8-zero-patches.patch: remove patch not applicable to zero compatible hotspot

- java-1.7.0-openjdk-fork.patch: Add support for architectures without fork syscall

- java-1.7.0-openjdk-aarch64.patch: Add support for aarch64

Solution

Update the affected java-1_7_0-openjdk packages.

See Also

https://en.opensuse.org/SourceUrls

https://bugzilla.novell.com/show_bug.cgi?id=816720

https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html

Plugin Details

Severity: Critical

ID: 74990

File Name: openSUSE-2013-402.nasl

Version: 1.8

Type: local

Agent: unix

Published: 6/13/2014

Updated: 5/25/2022

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:java-1_7_0-openjdk, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-debugsource, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-demo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-demo-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-devel, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-devel-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-javadoc, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-src, cpe:/o:novell:opensuse:12.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/24/2013

CISA Known Exploited Vulnerability Due Dates: 6/15/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Java Applet Reflection Type Confusion Remote Code Execution)

Reference Information

CVE: CVE-2013-0401, CVE-2013-1488, CVE-2013-1518, CVE-2013-1537, CVE-2013-1557, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2415, CVE-2013-2417, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2426, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431, CVE-2013-2436

BID: 59170, 58504, 58507, 59131, 59141, 59153, 59159, 59162, 59165, 59166, 59167, 59179, 59184, 59187, 59190, 59194, 59206, 59212, 59213, 59228, 59243