Anfälligkeitssuche        Suche in 172616 CVE Beschreibungen
und 81291 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for java-1_7_0-openjdk (openSUSE-SU-2013:0377-1)
Zusammenfassung:The remote host is missing an update for the 'java-1_7_0-openjdk'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'java-1_7_0-openjdk'
package(s) announced via the referenced advisory.

Vulnerability Insight:
java-1_7_0-openjdk was updated to icedtea-2.3.6
(bnc#803379) containing various security and bugfixes:

* Security fixes

- S6563318, CVE-2013-0424: RMI data sanitization

- S6664509, CVE-2013-0425: Add logging context

- S6664528, CVE-2013-0426: Find log level matching its
name or value given at construction time

- S6776941: CVE-2013-0427: Improve thread pool shutdown

- S7141694, CVE-2013-0429: Improving CORBA internals

- S7173145: Improve in-memory representation of

- S7186945: Unpack200 improvement

- S7186946: Refine unpacker resource usage

- S7186948: Improve Swing data validation

- S7186952, CVE-2013-0432: Improve clipboard access

- S7186954: Improve connection performance

- S7186957: Improve Pack200 data validation

- S7192392, CVE-2013-0443: Better validation of client

- S7192393, CVE-2013-0440: Better Checking of order of
TLS Messages

- S7192977, CVE-2013-0442: Issue in toolkit thread

- S7197546, CVE-2013-0428: (proxy) Reflect about creating
reflective proxies

- S7200491: Tighten up JTable layout code

- S7200493, CVE-2013-0444: Improve cache handling

- S7200499: Better data validation for options

- S7200500: Launcher better input validation

- S7201064: Better dialogue checking

- S7201066, CVE-2013-0441: Change modifiers on unused

- S7201068, CVE-2013-0435: Better handling of UI elements

- S7201070: Serialization to conform to protocol

- S7201071, CVE-2013-0433: InetSocketAddress
serialization issue

- S8000210: Improve JarFile code quality

- S8000537, CVE-2013-0450: Contextualize
RequiredModelMBean class

- S8000539, CVE-2013-0431: Introspect JMX data handling

- S8000540, CVE-2013-1475: Improve IIOP type reuse

- S8000631, CVE-2013-1476: Restrict access to class

- S8001235, CVE-2013-0434: Improve JAXP HTTP handling

- S8001242: Improve RMI HTTP conformance

- S8001307: Modify ACC_SUPER behavior

- S8001972, CVE-2013-1478: Improve image processing

- S8002325, CVE-2013-1480: Improve management of images

* Backports

- S7057320:
failing intermittently

- S7083664: TEST_BUG: test hard code of using c:/temp but
this dir might not exist

- S7107613: scalability blocker in

- S7107616: scalability blocker in

- S7146424: Wildcard expansion for single entry classpath

- S7160609: [macosx] JDK crash in libjvm.dylib ( C
[GeForceGLDriver+0x675a] gldAttachDrawable+0x941)

- S7160951: [macosx] ActionListener called t ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
java-1_7_0-openjdk on openSUSE 12.2

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2013-0424
BugTraq ID: 57715
Cert/CC Advisory: TA13-032A
CERT/CC vulnerability note: VU#858729
HPdes Security Advisory: HPSBMU02874
HPdes Security Advisory: HPSBUX02857
HPdes Security Advisory: HPSBUX02864
HPdes Security Advisory: SSRT101103
HPdes Security Advisory: SSRT101156
HPdes Security Advisory: SSRT101184
RedHat Security Advisories: RHSA-2013:0236
RedHat Security Advisories: RHSA-2013:0237
RedHat Security Advisories: RHSA-2013:0245
RedHat Security Advisories: RHSA-2013:0246
RedHat Security Advisories: RHSA-2013:0247
RedHat Security Advisories: RHSA-2013:1455
RedHat Security Advisories: RHSA-2013:1456
SuSE Security Announcement: SUSE-SU-2013:0478 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:0312 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:0377 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2013-0425
BugTraq ID: 57709
Common Vulnerability Exposure (CVE) ID: CVE-2013-0426
BugTraq ID: 57711
Common Vulnerability Exposure (CVE) ID: CVE-2013-0427
BugTraq ID: 57724
Common Vulnerability Exposure (CVE) ID: CVE-2013-0428
BugTraq ID: 57713
Common Vulnerability Exposure (CVE) ID: CVE-2013-0429
BugTraq ID: 57710
Common Vulnerability Exposure (CVE) ID: CVE-2013-0431
Bugtraq: 20130122 Re: [SE-2012-01] Java 7 Update 11 confirmed to be vulnerable (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2013-0432
BugTraq ID: 57727
Common Vulnerability Exposure (CVE) ID: CVE-2013-0433
BugTraq ID: 57719
Common Vulnerability Exposure (CVE) ID: CVE-2013-0434
BugTraq ID: 57730
Common Vulnerability Exposure (CVE) ID: CVE-2013-0435
BugTraq ID: 57729
Common Vulnerability Exposure (CVE) ID: CVE-2013-0440
BugTraq ID: 57712
Common Vulnerability Exposure (CVE) ID: CVE-2013-0441
BugTraq ID: 57692
Common Vulnerability Exposure (CVE) ID: CVE-2013-0442
BugTraq ID: 57687
Common Vulnerability Exposure (CVE) ID: CVE-2013-0443
BugTraq ID: 57702
Common Vulnerability Exposure (CVE) ID: CVE-2013-0444
Common Vulnerability Exposure (CVE) ID: CVE-2013-0450
BugTraq ID: 57703
Common Vulnerability Exposure (CVE) ID: CVE-2013-1475
BugTraq ID: 57694
Common Vulnerability Exposure (CVE) ID: CVE-2013-1476
BugTraq ID: 57696
Common Vulnerability Exposure (CVE) ID: CVE-2013-1478
BugTraq ID: 57686
Common Vulnerability Exposure (CVE) ID: CVE-2013-1480
BugTraq ID: 57691
CopyrightCopyright (C) 2013 Greenbone Networks GmbH

Dies ist nur einer von 81291 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.