CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.5%
This update brings OpenJDK7 u1 to Fedora. The following issues have been ad= dressed :
Updated to IcedTea 2.0 tag in the IcedTea OpenJDK7 forest
Added system timezone support
Revamped version/release naming scheme to make it proper
Security fixes
S7000600, CVE-2011-3547: InputStream skip() information leak
S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow
S7032417, CVE-2011-3552: excessive default UDP socket limit under Secur= ityManager
S7046823, CVE-2011-3544: missing SecurityManager checks in scripting en= gine
S7055902, CVE-2011-3521: IIOP deserialization code execution
S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack agai= nst SSL/TLS (BEAST)
S7070134, CVE-2011-3558: HotSpot crashes with sigsegv from PorterStemmer
S7077466, CVE-2011-3556: RMI DGC server remote code execution
S7083012, CVE-2011-3557: RMI registry privileged code execution
S7096936, CVE-2011-3560: missing checkSetFactory calls in HttpsURLConne= ction
-----=
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2011-15555.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(56800);
script_version("1.21");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_bugtraq_id(49778, 50211, 50215, 50216, 50218, 50224, 50231, 50234, 50236, 50242, 50243, 50248);
script_xref(name:"FEDORA", value:"2011-15555");
script_name(english:"Fedora 16 : java-1.7.0-openjdk-1.7.0.1-2.0.2.fc16 (2011-15555)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"This update brings OpenJDK7 u1 to Fedora. The following issues have
been ad= dressed :
- Updated to IcedTea 2.0 tag in the IcedTea OpenJDK7
forest
- Added system timezone support
- Revamped version/release naming scheme to make it
proper
- Security fixes
- S7000600, CVE-2011-3547: InputStream skip()
information leak
- S7019773, CVE-2011-3548: mutable static
AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper
integer overflow
- S7032417, CVE-2011-3552: excessive default UDP socket
limit under Secur= ityManager
- S7046823, CVE-2011-3544: missing SecurityManager checks
in scripting en= gine
- S7055902, CVE-2011-3521: IIOP deserialization code
execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR
files uncompress erro= r checks
- S7064341, CVE-2011-3389: HTTPS: block-wise
chosen-plaintext attack agai= nst SSL/TLS (BEAST)
- S7070134, CVE-2011-3558: HotSpot crashes with sigsegv
from PorterStemmer
- S7077466, CVE-2011-3556: RMI DGC server remote code
execution
- S7083012, CVE-2011-3557: RMI registry privileged code
execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls
in HttpsURLConne= ction
----------------------------------------------------------------------
-----=
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
# https://lists.fedoraproject.org/pipermail/package-announce/2011-November/069027.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?311aed25"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected java-1.7.0-openjdk package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:java-1.7.0-openjdk");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:16");
script_set_attribute(attribute:"patch_publication_date", value:"2011/11/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/11/14");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^16([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 16.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC16", reference:"java-1.7.0-openjdk-1.7.0.1-2.0.2.fc16")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "java-1.7.0-openjdk");
}
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.5%