Language:
http://www.nessus.org/u?024ddac1
http://support.novell.com/security/cve/CVE-2013-2400.html
http://support.novell.com/security/cve/CVE-2013-2407.html
http://support.novell.com/security/cve/CVE-2013-2442.html
http://support.novell.com/security/cve/CVE-2013-2448.html
http://support.novell.com/security/cve/CVE-2013-2453.html
http://support.novell.com/security/cve/CVE-2013-2454.html
http://support.novell.com/security/cve/CVE-2013-2456.html
http://support.novell.com/security/cve/CVE-2013-2457.html
http://support.novell.com/security/cve/CVE-2013-2458.html
http://support.novell.com/security/cve/CVE-2013-2459.html
http://support.novell.com/security/cve/CVE-2013-2460.html
http://support.novell.com/security/cve/CVE-2013-2462.html
http://support.novell.com/security/cve/CVE-2013-2463.html
http://support.novell.com/security/cve/CVE-2013-2464.html
http://support.novell.com/security/cve/CVE-2013-2465.html
http://support.novell.com/security/cve/CVE-2013-2466.html
http://support.novell.com/security/cve/CVE-2013-2468.html
http://support.novell.com/security/cve/CVE-2013-2469.html
http://support.novell.com/security/cve/CVE-2013-2470.html
http://support.novell.com/security/cve/CVE-2013-2471.html
http://support.novell.com/security/cve/CVE-2013-2472.html
http://support.novell.com/security/cve/CVE-2013-2473.html
http://support.novell.com/security/cve/CVE-2013-3006.html
http://support.novell.com/security/cve/CVE-2013-3007.html
http://support.novell.com/security/cve/CVE-2013-3008.html
http://support.novell.com/security/cve/CVE-2013-3009.html
http://support.novell.com/security/cve/CVE-2013-3010.html
http://support.novell.com/security/cve/CVE-2013-3011.html
http://support.novell.com/security/cve/CVE-2013-3012.html
http://support.novell.com/security/cve/CVE-2013-3743.html
http://support.novell.com/security/cve/CVE-2013-3744.html
http://support.novell.com/security/cve/CVE-2013-4002.html
http://www.ibm.com/developerworks/java/jdk/alerts/
https://bugzilla.novell.com/817062
https://bugzilla.novell.com/823034
Severity: Critical
ID: 83595
File Name: suse_SU-2013-1256-1.nasl
Version: 2.7
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/20/2015
Updated: 3/29/2022
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:novell:suse_linux:java-1_7_0-ibm, p-cpe:/a:novell:suse_linux:java-1_7_0-ibm-plugin, p-cpe:/a:novell:suse_linux:java-1_7_0-ibm-alsa, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:java-1_7_0-ibm-jdbc
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/25/2013
CISA Known Exploited Vulnerability Due Dates: 4/18/2022
Core Impact
Metasploit (Java storeImageArray() Invalid Array Indexing Vulnerability)
CVE: CVE-2013-2400, CVE-2013-2407, CVE-2013-2442, CVE-2013-2448, CVE-2013-2453, CVE-2013-2454, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458, CVE-2013-2459, CVE-2013-2460, CVE-2013-2462, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473, CVE-2013-3006, CVE-2013-3007, CVE-2013-3008, CVE-2013-3009, CVE-2013-3010, CVE-2013-3011, CVE-2013-3012, CVE-2013-3743, CVE-2013-3744, CVE-2013-4002
BID: 60621, 60623, 60624, 60626, 60630, 60631, 60632, 60635, 60637, 60640, 60641, 60643, 60644, 60647, 60650, 60651, 60652, 60653, 60654, 60655, 60656, 60657, 60658, 60659, 61302, 61306, 61307, 61308, 61310, 61311, 61312, 61313