Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2017.0233
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2017-0233)
Summary:The remote host is missing an update for the 'copy-jdk-configs, java-1.8.0-openjdk' package(s) announced via the MGASA-2017-0233 advisory.
Description:Summary:
The remote host is missing an update for the 'copy-jdk-configs, java-1.8.0-openjdk' package(s) announced via the MGASA-2017-0233 advisory.

Vulnerability Insight:
It was discovered that the DCG implementation in the RMI component of
OpenJDK failed to correctly handle references. A remote attacker could
possibly use this flaw to execute arbitrary code with the privileges of
RMI registry or a Java RMI application (CVE-2017-10102).

Multiple flaws were discovered in the RMI, JAXP, ImageIO, Libraries,
AWT, Hotspot, and Security components in OpenJDK. An untrusted Java
application or applet could use these flaws to completely bypass Java
sandbox restrictions (CVE-2017-10107, CVE-2017-10096, CVE-2017-10101,
CVE-2017-10089, CVE-2017-10090, CVE-2017-10087, CVE-2017-10111,
CVE-2017-10110, CVE-2017-10074, CVE-2017-10067).

It was discovered that the LDAPCertStore class in the Security component
of OpenJDK followed LDAP referrals to arbitrary URLs. A specially
crafted LDAP referral URL could cause LDAPCertStore to communicate with
non-LDAP servers (CVE-2017-10116).

It was discovered that the Nashorn JavaScript engine in the Scripting
component of OpenJDK could allow scripts to access Java APIs even when
access to Java APIs was disabled. An untrusted JavaScript executed by
Nashorn could use this flaw to bypass intended restrictions
(CVE-2017-10078).

It was discovered that the Security component of OpenJDK could fail to
properly enforce restrictions defined for processing of X.509
certificate chains. A remote attacker could possibly use this flaw to
make Java accept certificate using one of the disabled algorithms
(CVE-2017-10198).

A covert timing channel flaw was found in the DSA implementation in the
JCE component of OpenJDK. A remote attacker able to make a Java
application generate DSA signatures on demand could possibly use this
flaw to extract certain information about the used key via a timing side
channel (CVE-2017-10115).

A covert timing channel flaw was found in the PKCS#8 implementation in
the JCE component of OpenJDK. A remote attacker able to make a Java
application repeatedly compare PKCS#8 key against an attacker controlled
value could possibly use this flaw to determine the key via a timing
side channel (CVE-2017-10135).

It was discovered that the BasicAttribute and CodeSource classes in
OpenJDK did not limit the amount of memory allocated when creating
object instances from a serialized form. A specially crafted serialized
input stream could cause Java to consume an excessive amount of memory
(CVE-2017-10108, CVE-2017-10109).

Multiple flaws were found in the Hotspot and Security components in
OpenJDK. An untrusted Java application or applet could use these flaws
to bypass certain Java sandbox restrictions (CVE-2017-10081,
CVE-2017-10193).

It was discovered that the JPEGImageReader implementation in the 2D
component of OpenJDK would, in certain cases, read all image data even
if it was not used later. A specially crafted image could cause a Java
application to temporarily use an excessive amount of CPU and memory
(CVE-2017-10053).

Affected Software/OS:
'copy-jdk-configs, java-1.8.0-openjdk' package(s) on Mageia 5, Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-10053
BugTraq ID: 99842
http://www.securityfocus.com/bid/99842
Debian Security Information: DSA-3919 (Google Search)
http://www.debian.org/security/2017/dsa-3919
Debian Security Information: DSA-3954 (Google Search)
http://www.debian.org/security/2017/dsa-3954
https://security.gentoo.org/glsa/201709-22
RedHat Security Advisories: RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1789
RedHat Security Advisories: RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1790
RedHat Security Advisories: RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1791
RedHat Security Advisories: RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:1792
RedHat Security Advisories: RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2424
RedHat Security Advisories: RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2469
RedHat Security Advisories: RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2481
RedHat Security Advisories: RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:2530
RedHat Security Advisories: RHSA-2017:3453
https://access.redhat.com/errata/RHSA-2017:3453
http://www.securitytracker.com/id/1038931
Common Vulnerability Exposure (CVE) ID: CVE-2017-10067
BugTraq ID: 99756
http://www.securityfocus.com/bid/99756
Common Vulnerability Exposure (CVE) ID: CVE-2017-10074
BugTraq ID: 99731
http://www.securityfocus.com/bid/99731
Common Vulnerability Exposure (CVE) ID: CVE-2017-10078
BugTraq ID: 99752
http://www.securityfocus.com/bid/99752
Common Vulnerability Exposure (CVE) ID: CVE-2017-10081
BugTraq ID: 99853
http://www.securityfocus.com/bid/99853
Common Vulnerability Exposure (CVE) ID: CVE-2017-10087
BugTraq ID: 99703
http://www.securityfocus.com/bid/99703
Common Vulnerability Exposure (CVE) ID: CVE-2017-10089
BugTraq ID: 99659
http://www.securityfocus.com/bid/99659
Common Vulnerability Exposure (CVE) ID: CVE-2017-10090
BugTraq ID: 99706
http://www.securityfocus.com/bid/99706
Common Vulnerability Exposure (CVE) ID: CVE-2017-10096
BugTraq ID: 99670
http://www.securityfocus.com/bid/99670
Common Vulnerability Exposure (CVE) ID: CVE-2017-10101
BugTraq ID: 99674
http://www.securityfocus.com/bid/99674
Common Vulnerability Exposure (CVE) ID: CVE-2017-10102
BugTraq ID: 99712
http://www.securityfocus.com/bid/99712
Common Vulnerability Exposure (CVE) ID: CVE-2017-10107
BugTraq ID: 99719
http://www.securityfocus.com/bid/99719
Common Vulnerability Exposure (CVE) ID: CVE-2017-10108
BugTraq ID: 99846
http://www.securityfocus.com/bid/99846
Common Vulnerability Exposure (CVE) ID: CVE-2017-10109
BugTraq ID: 99847
http://www.securityfocus.com/bid/99847
Common Vulnerability Exposure (CVE) ID: CVE-2017-10110
BugTraq ID: 99643
http://www.securityfocus.com/bid/99643
Common Vulnerability Exposure (CVE) ID: CVE-2017-10111
BugTraq ID: 99707
http://www.securityfocus.com/bid/99707
Common Vulnerability Exposure (CVE) ID: CVE-2017-10115
BugTraq ID: 99774
http://www.securityfocus.com/bid/99774
Common Vulnerability Exposure (CVE) ID: CVE-2017-10116
BugTraq ID: 99734
http://www.securityfocus.com/bid/99734
Common Vulnerability Exposure (CVE) ID: CVE-2017-10135
BugTraq ID: 99839
http://www.securityfocus.com/bid/99839
Common Vulnerability Exposure (CVE) ID: CVE-2017-10193
BugTraq ID: 99854
http://www.securityfocus.com/bid/99854
RedHat Security Advisories: RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3392
Common Vulnerability Exposure (CVE) ID: CVE-2017-10198
BugTraq ID: 99818
http://www.securityfocus.com/bid/99818
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.