Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2015.0037
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2015-0037)
Summary:The remote host is missing an update for the 'java-1.7.0-openjdk' package(s) announced via the MGASA-2015-0037 advisory.
Description:Summary:
The remote host is missing an update for the 'java-1.7.0-openjdk' package(s) announced via the MGASA-2015-0037 advisory.

Vulnerability Insight:
Updated java-1.7.0 packages fix security vulnerabilities:

A flaw was found in the way the Hotspot component in OpenJDK verified
bytecode from the class files. An untrusted Java application or applet
could possibly use this flaw to bypass Java sandbox restrictions
(CVE-2014-6601).

Multiple improper permission check issues were discovered in the JAX-WS,
and RMI components in OpenJDK. An untrusted Java application or applet
could use these flaws to bypass Java sandbox restrictions (CVE-2015-0412,
CVE-2015-0408).

A flaw was found in the way the Hotspot garbage collector handled phantom
references. An untrusted Java application or applet could use this flaw to
corrupt the Java Virtual Machine memory and, possibly, execute arbitrary
code, bypassing Java sandbox restrictions (CVE-2015-0395).

A flaw was found in the way the DER (Distinguished Encoding Rules) decoder
in the Security component in OpenJDK handled negative length values. A
specially crafted, DER-encoded input could cause a Java application to
enter an infinite loop when decoded (CVE-2015-0410).

It was discovered that the SSL/TLS implementation in the JSSE component in
OpenJDK failed to properly check whether the ChangeCipherSpec was received
during the SSL/TLS connection handshake. An MITM attacker could possibly
use this flaw to force a connection to be established without encryption
being enabled (CVE-2014-6593).

An information leak flaw was found in the Swing component in OpenJDK. An
untrusted Java application or applet could use this flaw to bypass certain
Java sandbox restrictions (CVE-2015-0407).

A NULL pointer dereference flaw was found in the MulticastSocket
implementation in the Libraries component of OpenJDK. An untrusted Java
application or applet could possibly use this flaw to bypass certain Java
sandbox restrictions (CVE-2014-6587).

Multiple boundary check flaws were found in the font parsing code in the 2D
component in OpenJDK. A specially crafted font file could allow an
untrusted Java application or applet to disclose portions of the Java
Virtual Machine memory (CVE-2014-6585, CVE-2014-6591).

Multiple insecure temporary file use issues were found in the way the
Hotspot component in OpenJDK created performance statistics and error log
files. A local attacker could possibly make a victim using OpenJDK
overwrite arbitrary files using a symlink attack (CVE-2015-0383).

Note: This update disables SSL 3.0 by default to mitigate the POODLE issue,
also known as CVE-2014-3566. The jdk.tls.disabledAlgorithms security
property can be used to re-enable SSL 3.0 support if needed. For additional
information, refer to the Red Hat Bugzilla bug linked to in the References
section.

Affected Software/OS:
'java-1.7.0-openjdk' package(s) on Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-6585
BugTraq ID: 72173
http://www.securityfocus.com/bid/72173
Debian Security Information: DSA-3144 (Google Search)
http://www.debian.org/security/2015/dsa-3144
Debian Security Information: DSA-3147 (Google Search)
http://www.debian.org/security/2015/dsa-3147
Debian Security Information: DSA-3323 (Google Search)
http://www.debian.org/security/2015/dsa-3323
https://security.gentoo.org/glsa/201507-14
https://security.gentoo.org/glsa/201603-14
HPdes Security Advisory: HPSBUX03273
http://marc.info/?l=bugtraq&m=142496355704097&w=2
HPdes Security Advisory: HPSBUX03281
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
HPdes Security Advisory: SSRT101951
HPdes Security Advisory: SSRT101968
http://marc.info/?l=bugtraq&m=142607790919348&w=2
RedHat Security Advisories: RHSA-2015:0068
http://rhn.redhat.com/errata/RHSA-2015-0068.html
RedHat Security Advisories: RHSA-2015:0079
http://rhn.redhat.com/errata/RHSA-2015-0079.html
RedHat Security Advisories: RHSA-2015:0080
http://rhn.redhat.com/errata/RHSA-2015-0080.html
RedHat Security Advisories: RHSA-2015:0085
http://rhn.redhat.com/errata/RHSA-2015-0085.html
RedHat Security Advisories: RHSA-2015:0086
http://rhn.redhat.com/errata/RHSA-2015-0086.html
RedHat Security Advisories: RHSA-2015:0136
http://rhn.redhat.com/errata/RHSA-2015-0136.html
RedHat Security Advisories: RHSA-2015:0264
http://rhn.redhat.com/errata/RHSA-2015-0264.html
http://www.securitytracker.com/id/1031580
SuSE Security Announcement: SUSE-SU-2015:0336 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
SuSE Security Announcement: SUSE-SU-2015:0503 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
SuSE Security Announcement: openSUSE-SU-2015:0190 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
http://www.ubuntu.com/usn/USN-2486-1
http://www.ubuntu.com/usn/USN-2487-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-6587
BugTraq ID: 72168
http://www.securityfocus.com/bid/72168
Common Vulnerability Exposure (CVE) ID: CVE-2014-6591
BugTraq ID: 72175
http://www.securityfocus.com/bid/72175
Common Vulnerability Exposure (CVE) ID: CVE-2014-6593
BugTraq ID: 72169
http://www.securityfocus.com/bid/72169
https://www.exploit-db.com/exploits/38641/
http://packetstormsecurity.com/files/134251/Java-Secure-Socket-Extension-JSSE-SKIP-TLS.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-6601
BugTraq ID: 72132
http://www.securityfocus.com/bid/72132
Common Vulnerability Exposure (CVE) ID: CVE-2015-0383
BugTraq ID: 72155
http://www.securityfocus.com/bid/72155
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158791.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158810.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158088.html
XForce ISS Database: oracle-cpujan2015-cve20150383(100148)
https://exchange.xforce.ibmcloud.com/vulnerabilities/100148
Common Vulnerability Exposure (CVE) ID: CVE-2015-0395
BugTraq ID: 72142
http://www.securityfocus.com/bid/72142
XForce ISS Database: oracle-cpujan2015-cve20150395(100143)
https://exchange.xforce.ibmcloud.com/vulnerabilities/100143
Common Vulnerability Exposure (CVE) ID: CVE-2015-0407
BugTraq ID: 72162
http://www.securityfocus.com/bid/72162
XForce ISS Database: oracle-cpujan2015-cve20150407(100150)
https://exchange.xforce.ibmcloud.com/vulnerabilities/100150
Common Vulnerability Exposure (CVE) ID: CVE-2015-0408
BugTraq ID: 72140
http://www.securityfocus.com/bid/72140
XForce ISS Database: oracle-cpujan2015-cve20150408(100142)
https://exchange.xforce.ibmcloud.com/vulnerabilities/100142
Common Vulnerability Exposure (CVE) ID: CVE-2015-0410
BugTraq ID: 72165
http://www.securityfocus.com/bid/72165
XForce ISS Database: oracle-cpujan2015-cve20150410(100151)
https://exchange.xforce.ibmcloud.com/vulnerabilities/100151
Common Vulnerability Exposure (CVE) ID: CVE-2015-0412
BugTraq ID: 72136
http://www.securityfocus.com/bid/72136
XForce ISS Database: oracle-cpujan2015-cve20150412(100140)
https://exchange.xforce.ibmcloud.com/vulnerabilities/100140
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.