Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.871876 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for java-1.7.0-openjdk RHSA-2017:2424-01 |
Resumen: | The remote host is missing an update for the 'java-1.7.0-openjdk'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'java-1.7.0-openjdk' package(s) announced via the referenced advisory. Vulnerability Insight: The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Security Fix(es): * It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-10102) * Multiple flaws were discovered in the RMI, JAXP, ImageIO, Libraries, AWT, Hotspot, and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10107, CVE-2017-10096, CVE-2017-10101, CVE-2017-10089, CVE-2017-10090, CVE-2017-10087, CVE-2017-10110, CVE-2017-10074, CVE-2017-10067) * It was discovered that the LDAPCertStore class in the Security component of OpenJDK followed LDAP referrals to arbitrary URLs. A specially crafted LDAP referral URL could cause LDAPCertStore to communicate with non-LDAP servers. (CVE-2017-10116) * It was discovered that the wsdlimport tool in the JAX-WS component of OpenJDK did not use secure XML parser settings when parsing WSDL XML documents. A specially crafted WSDL document could cause wsdlimport to use an excessive amount of CPU and memory, open connections to other hosts, or leak information. (CVE-2017-10243) * A covert timing channel flaw was found in the DSA implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application generate DSA signatures on demand could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2017-10115) * A covert timing channel flaw was found in the PKCS#8 implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application repeatedly compare PKCS#8 key against an attacker controlled value could possibly use this flaw to determine the key via a timing side channel. (CVE-2017-10135) * It was discovered that the BasicAttribute and CodeSource classes in OpenJDK did not limit the amount of memory allocated when creating object instances from a serialized form. A specially crafted serialized input stream could cause Java to consume an excessive amount of memory. (CVE-2017-10108, CVE-2017-10109) * A flaw was found in the Hotspot component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restriction ... Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: java-1.7.0-openjdk on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server (v. 7), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-10053 Common Vulnerability Exposure (CVE) ID: CVE-2017-10067 Common Vulnerability Exposure (CVE) ID: CVE-2017-10074 Common Vulnerability Exposure (CVE) ID: CVE-2017-10081 Common Vulnerability Exposure (CVE) ID: CVE-2017-10087 Common Vulnerability Exposure (CVE) ID: CVE-2017-10089 Common Vulnerability Exposure (CVE) ID: CVE-2017-10090 Common Vulnerability Exposure (CVE) ID: CVE-2017-10096 Common Vulnerability Exposure (CVE) ID: CVE-2017-10101 Common Vulnerability Exposure (CVE) ID: CVE-2017-10102 Common Vulnerability Exposure (CVE) ID: CVE-2017-10107 Common Vulnerability Exposure (CVE) ID: CVE-2017-10108 Common Vulnerability Exposure (CVE) ID: CVE-2017-10109 Common Vulnerability Exposure (CVE) ID: CVE-2017-10110 Common Vulnerability Exposure (CVE) ID: CVE-2017-10115 Common Vulnerability Exposure (CVE) ID: CVE-2017-10116 Common Vulnerability Exposure (CVE) ID: CVE-2017-10135 Common Vulnerability Exposure (CVE) ID: CVE-2017-10243 |
Copyright | Copyright (C) 2017 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |