Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.71858
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2012:1223
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing updates announced in
advisory RHSA-2012:1223.

These packages provide the OpenJDK 7 Java Runtime Environment and the
OpenJDK 7 Software Development Kit.

Multiple improper permission check issues were discovered in the Beans
component in OpenJDK. An untrusted Java application or applet could use
these flaws to bypass Java sandbox restrictions. (CVE-2012-4681,
CVE-2012-1682, CVE-2012-3136)

A hardening fix was applied to the AWT component in OpenJDK, removing
functionality from the restricted SunToolkit class that was used in
combination with other flaws to bypass Java sandbox restrictions.
(CVE-2012-0547)

All users of java-1.7.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2012-1223.html
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html

Risk factor : High

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-0547
BugTraq ID: 55339
http://www.securityfocus.com/bid/55339
http://security.gentoo.org/glsa/glsa-201406-32.xml
HPdes Security Advisory: HPSBUX02824
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03533078
HPdes Security Advisory: HPSBUX02825
http://marc.info/?l=bugtraq&m=135161897205627&w=2
HPdes Security Advisory: SSRT100970
HPdes Security Advisory: SSRT100974
RedHat Security Advisories: RHSA-2012:1222
http://rhn.redhat.com/errata/RHSA-2012-1222.html
RedHat Security Advisories: RHSA-2012:1225
http://rhn.redhat.com/errata/RHSA-2012-1225.html
RedHat Security Advisories: RHSA-2012:1392
http://rhn.redhat.com/errata/RHSA-2012-1392.html
RedHat Security Advisories: RHSA-2012:1466
http://rhn.redhat.com/errata/RHSA-2012-1466.html
RedHat Security Advisories: RHSA-2013:1455
http://rhn.redhat.com/errata/RHSA-2013-1455.html
RedHat Security Advisories: RHSA-2013:1456
http://rhn.redhat.com/errata/RHSA-2013-1456.html
http://secunia.com/advisories/51044
http://secunia.com/advisories/51141
http://secunia.com/advisories/51327
SuSE Security Announcement: SUSE-SU-2012:1148 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html
SuSE Security Announcement: SUSE-SU-2012:1231 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html
SuSE Security Announcement: openSUSE-SU-2012:1175 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html
http://www.ubuntu.com/usn/USN-1553-1
Common Vulnerability Exposure (CVE) ID: CVE-2012-1682
http://marc.info/?l=bugtraq&m=135109152819176&w=2
Common Vulnerability Exposure (CVE) ID: CVE-2012-3136
Common Vulnerability Exposure (CVE) ID: CVE-2012-4681
BugTraq ID: 55213
http://www.securityfocus.com/bid/55213
Cert/CC Advisory: TA12-240A
http://www.us-cert.gov/cas/techalerts/TA12-240A.html
http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html
http://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html
http://labs.alienvault.com/labs/index.php/2012/new-java-0day-exploited-in-the-wild/
http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html
https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day
SuSE Security Announcement: SUSE-SU-2012:1398 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.