Lucene search

K
debianDebianDEBIAN:DSA-2507-1:43C0F
HistoryJul 04, 2012 - 3:05 p.m.

[SECURITY] [DSA 2507-1] openjdk-6 security update

2012-07-0415:05:53
lists.debian.org
34

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.965

Percentile

99.6%


Debian Security Advisory DSA-2507-1 [email protected]
http://www.debian.org/security/ Moritz Muehlenhoff
July 04, 2012 http://www.debian.org/security/faq


Package : openjdk-6
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717
CVE-2012-1718 CVE-2012-1719 CVE-2012-1723 CVE-2012-1724
CVE-2012-1725

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform.

CVE-2012-1711 CVE-2012-1719

Multiple errors in the CORBA implementation could lead to
breakouts of the Java sandbox

CVE-2012-1713

Missing input sanitising in the font manager could lead to
the execution of arbitrary code.

CVE-2012-1716

The SynthLookAndFeel Swing class could be abused to break
out of the Java sandbox.

CVE-2012-1717

Several temporary files were created insecurely, resulting in
local information disclosure.

CVE-2012-1718

Certificate revocation lists were incorrectly implemented.

CVE-2012-1723 CVE-2012-1725

Validation errors in the bytecode verifier of the Hotspot VM
could lead to breakouts of the Java sandbox.

CVE-2012-1724

Missing input sanitising in the XML parser could lead to denial
of service through an infinite loop.

For the stable distribution (squeeze), this problem has been fixed in
version 6b18-1.8.13-0+squeeze2.

For the unstable distribution (sid), this problem has been fixed in
version 6b24-1.11.3-1.

We recommend that you upgrade your openjdk-6 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.965

Percentile

99.6%