English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 123947 CVE Beschreibungen
und 58962 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.835195
Kategorie:HP-UX Local Security Checks
Titel:HP-UX Update for Java HPSBUX02411
Zusammenfassung:Check for the Version of Java
Beschreibung:Description:


Vulnerability Insight:
Potential security vulnerabilities have been identified in Java Runtime
Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These
vulnerabilities may allow remote unauthorized access, privilege escalation,
execution of arbitrary code, and creation of a Denial of Service (DoS)

Impact:
Mulitple remote vulnerabilities

Affected Software/OS:
Java on
HP-UX B.11.11, B.11.23, B.11.31 running HP JDK and JRE 6.0.02 or earlier
HP-UX B.11.11, B.11.23, B.11.31 running HP JDK and JRE 5.0.14 or earlier
HP-UX B.11.11, B.11.23, B.11.31 running HP Java SDK and RTE 1.4.2.20 or
earlier

Fix: Please Install the Updated Packages.

References:
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01683026-2

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-2086
Bugtraq: 20081204 CVE-2008-2086: Java Web Start File Inclusion via System PropertiesOverride (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498907/100/0/threaded
http://www.vsecurity.com/bulletins/advisories/2008/JWS-props.txt
http://lists.apple.com/archives/security-announce/2009/Feb/msg00003.html
http://security.gentoo.org/glsa/glsa-200911-02.xml
HPdes Security Advisory: HPSBUX02411
http://marc.info/?l=bugtraq&m=123678756409861&w=2
HPdes Security Advisory: SSRT080111
HPdes Security Advisory: HPSBMA02486
http://marc.info/?l=bugtraq&m=126583436323697&w=2
HPdes Security Advisory: SSRT090049
RedHat Security Advisories: RHSA-2008:1018
RedHat Security Advisories: RHSA-2008:1025
http://rhn.redhat.com/errata/RHSA-2008-1025.html
http://www.redhat.com/support/errata/RHSA-2009-0015.html
http://www.redhat.com/support/errata/RHSA-2009-0016.html
http://www.redhat.com/support/errata/RHSA-2009-0445.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-244988-1
SuSE Security Announcement: SUSE-SA:2009:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html
SuSE Security Announcement: SUSE-SA:2009:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html
SuSE Security Announcement: SUSE-SR:2009:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
Cert/CC Advisory: TA08-340A
http://www.us-cert.gov/cas/techalerts/TA08-340A.html
BugTraq ID: 32620
http://www.securityfocus.com/bid/32620
http://osvdb.org/50510
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5601
http://www.securitytracker.com/id?1021318
http://secunia.com/advisories/32991
http://secunia.com/advisories/33015
http://secunia.com/advisories/33710
http://secunia.com/advisories/33528
http://secunia.com/advisories/34233
http://secunia.com/advisories/34605
http://secunia.com/advisories/34889
http://secunia.com/advisories/35065
http://secunia.com/advisories/37386
http://secunia.com/advisories/38539
http://securityreason.com/securityalert/4693
http://www.vupen.com/english/advisories/2009/0424
http://www.vupen.com/english/advisories/2009/0672
Common Vulnerability Exposure (CVE) ID: CVE-2008-5339
http://rhn.redhat.com/errata/RHSA-2008-1018.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6409
http://www.vupen.com/english/advisories/2008/3339
Common Vulnerability Exposure (CVE) ID: CVE-2008-5340
http://www.redhat.com/support/errata/RHSA-2009-0369.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6627
http://secunia.com/advisories/34447
Common Vulnerability Exposure (CVE) ID: CVE-2008-5341
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6529
Common Vulnerability Exposure (CVE) ID: CVE-2008-5342
http://osvdb.org/50514
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6359
Common Vulnerability Exposure (CVE) ID: CVE-2008-5343
http://xs-sniper.com/blog/2008/12/17/sun-fixes-gifars/
BugTraq ID: 32892
http://www.securityfocus.com/bid/32892
http://osvdb.org/50512
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5924
Common Vulnerability Exposure (CVE) ID: CVE-2008-5344
http://osvdb.org/50513
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6249
XForce ISS Database: jre-appletclass-security-bypass(47057)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47057
Common Vulnerability Exposure (CVE) ID: CVE-2008-5345
RedHat Security Advisories: RHSA-2009:0466
https://rhn.redhat.com/errata/RHSA-2009-0466.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-246387-1
http://osvdb.org/50508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6059
http://secunia.com/advisories/34972
http://www.securitytracker.com/id?1021305
Common Vulnerability Exposure (CVE) ID: CVE-2008-5347
http://sunsolve.sun.com/search/document.do?assetkey=1-26-246366-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019798.1-1
SuSE Security Announcement: SUSE-SR:2009:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
BugTraq ID: 32608
http://www.securityfocus.com/bid/32608
http://osvdb.org/50506
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5633
http://secunia.com/advisories/34259
http://www.securitytracker.com/id?1021307
http://secunia.com/advisories/33709
XForce ISS Database: jre-jaxws-jaxb-privilege-escalation(47068)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47068
Common Vulnerability Exposure (CVE) ID: CVE-2008-5348
http://sunsolve.sun.com/search/document.do?assetkey=1-26-246346-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019797.1-1
http://osvdb.org/50505
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6549
Common Vulnerability Exposure (CVE) ID: CVE-2008-5350
http://sunsolve.sun.com/search/document.do?assetkey=1-26-246266-1
http://osvdb.org/50503
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6424
http://www.securitytracker.com/id?1021310
Common Vulnerability Exposure (CVE) ID: CVE-2008-5351
http://sunsolve.sun.com/search/document.do?assetkey=1-26-245246-1
http://osvdb.org/50502
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6212
http://www.securitytracker.com/id?1021311
Common Vulnerability Exposure (CVE) ID: CVE-2008-5353
Bugtraq: 20090524 Hardening OSX against CVE-2008-5353 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503797/100/0/threaded
http://blog.cr0.org/2009/05/write-once-own-everyone.html
http://landonf.bikemonkey.org/code/macosx/CVE-2008-5353.20090519.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-244991-1
http://osvdb.org/50500
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6511
http://www.securitytracker.com/id?1021313
http://secunia.com/advisories/35118
http://www.vupen.com/english/advisories/2009/1391
Common Vulnerability Exposure (CVE) ID: CVE-2008-5354
http://www.ximido.de/research/advisories/SM_Java-BO_200811.txt
http://sunsolve.sun.com/search/document.do?assetkey=1-26-244990-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6537
XForce ISS Database: jre-commandline-privilege-escalation(47060)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47060
Common Vulnerability Exposure (CVE) ID: CVE-2008-5356
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=757
http://sunsolve.sun.com/search/document.do?assetkey=1-26-244987-1
http://osvdb.org/50516
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6494
http://secunia.com/advisories/33187
XForce ISS Database: jre-truetype-font-bo(47103)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47103
Common Vulnerability Exposure (CVE) ID: CVE-2008-5357
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=760
http://osvdb.org/50517
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6505
XForce ISS Database: jre-font-privilege-escalation(47050)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47050
Common Vulnerability Exposure (CVE) ID: CVE-2008-5358
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=758
http://osvdb.org/50515
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6319
XForce ISS Database: jre-gif-images-privilege-escalation(47049)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47049
Common Vulnerability Exposure (CVE) ID: CVE-2008-5359
http://www.zerodayinitiative.com/advisories/ZDI-08-080/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5841
XForce ISS Database: jre-image-processing-privilege-escalation(47048)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47048
Common Vulnerability Exposure (CVE) ID: CVE-2008-5360
http://sunsolve.sun.com/search/document.do?assetkey=1-26-244986-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6596
http://www.securitytracker.com/id?1021316
XForce ISS Database: jre-guessable-file-unauth-access(47045)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47045
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

Dies ist nur einer von 58962 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Developer APIs | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2018 E-Soft Inc. Alle Rechte vorbehalten.