![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.72469 |
Kategorie: | Mandrake Local Security Checks |
Titel: | Mandriva Security Advisory MDVSA-2012:150-1 (java-1.6.0-openjdk) |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing an update to java-1.6.0-openjdk announced via advisory MDVSA-2012:150-1. Multiple security issues were identified and fixed in OpenJDK (icedtea6): Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited. NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities (CVE-2012-0547). Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136 (CVE-2012-1682). The updated packages provides icedtea6-1.11.4 which is not vulnerable to these issues. Update: Packages for Mandriva Linux 2011 is being provided. Affected: 2011. Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2012:150-1 http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html Risk factor : High |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0547 BugTraq ID: 55339 http://www.securityfocus.com/bid/55339 http://security.gentoo.org/glsa/glsa-201406-32.xml HPdes Security Advisory: HPSBUX02824 https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03533078 HPdes Security Advisory: HPSBUX02825 http://marc.info/?l=bugtraq&m=135161897205627&w=2 HPdes Security Advisory: SSRT100970 HPdes Security Advisory: SSRT100974 RedHat Security Advisories: RHSA-2012:1222 http://rhn.redhat.com/errata/RHSA-2012-1222.html RedHat Security Advisories: RHSA-2012:1225 http://rhn.redhat.com/errata/RHSA-2012-1225.html RedHat Security Advisories: RHSA-2012:1392 http://rhn.redhat.com/errata/RHSA-2012-1392.html RedHat Security Advisories: RHSA-2012:1466 http://rhn.redhat.com/errata/RHSA-2012-1466.html RedHat Security Advisories: RHSA-2013:1455 http://rhn.redhat.com/errata/RHSA-2013-1455.html RedHat Security Advisories: RHSA-2013:1456 http://rhn.redhat.com/errata/RHSA-2013-1456.html http://secunia.com/advisories/51044 http://secunia.com/advisories/51141 http://secunia.com/advisories/51327 SuSE Security Announcement: SUSE-SU-2012:1148 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html SuSE Security Announcement: SUSE-SU-2012:1231 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html SuSE Security Announcement: openSUSE-SU-2012:1175 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html http://www.ubuntu.com/usn/USN-1553-1 Common Vulnerability Exposure (CVE) ID: CVE-2012-3136 http://marc.info/?l=bugtraq&m=135109152819176&w=2 Common Vulnerability Exposure (CVE) ID: CVE-2012-1682 |
Copyright | Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |