Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63308
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-713-1)
Summary:The remote host is missing an update for the 'openjdk-6' package(s) announced via the USN-713-1 advisory.
Description:Summary:
The remote host is missing an update for the 'openjdk-6' package(s) announced via the USN-713-1 advisory.

Vulnerability Insight:
It was discovered that Java did not correctly handle untrusted applets.
If a user were tricked into running a malicious applet, a remote attacker
could gain user privileges, or list directory contents. (CVE-2008-5347,
CVE-2008-5350)

It was discovered that Kerberos authentication and RSA public key
processing were not correctly handled in Java. A remote attacker
could exploit these flaws to cause a denial of service. (CVE-2008-5348,
CVE-2008-5349)

It was discovered that Java accepted UTF-8 encodings that might be
handled incorrectly by certain applications. A remote attacker could
bypass string filters, possible leading to other exploits. (CVE-2008-5351)

Overflows were discovered in Java JAR processing. If a user or
automated system were tricked into processing a malicious JAR file,
a remote attacker could crash the application, leading to a denial of
service. (CVE-2008-5352, CVE-2008-5354)

It was discovered that Java calendar objects were not unserialized safely.
If a user or automated system were tricked into processing a specially
crafted calendar object, a remote attacker could execute arbitrary code
with user privileges. (CVE-2008-5353)

It was discovered that the Java image handling code could lead to memory
corruption. If a user or automated system were tricked into processing
a specially crafted image, a remote attacker could crash the application,
leading to a denial of service. (CVE-2008-5358, CVE-2008-5359)

It was discovered that temporary files created by Java had predictable
names. If a user or automated system were tricked into processing a
specially crafted JAR file, a remote attacker could overwrite sensitive
information. (CVE-2008-5360)

Affected Software/OS:
'openjdk-6' package(s) on Ubuntu 8.10.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-5347
BugTraq ID: 32608
http://www.securityfocus.com/bid/32608
Cert/CC Advisory: TA08-340A
http://www.us-cert.gov/cas/techalerts/TA08-340A.html
http://security.gentoo.org/glsa/glsa-200911-02.xml
HPdes Security Advisory: HPSBMA02486
http://marc.info/?l=bugtraq&m=126583436323697&w=2
HPdes Security Advisory: HPSBUX02411
http://marc.info/?l=bugtraq&m=123678756409861&w=2
HPdes Security Advisory: SSRT080111
HPdes Security Advisory: SSRT090049
http://osvdb.org/50506
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5633
RedHat Security Advisories: RHSA-2008:1018
http://rhn.redhat.com/errata/RHSA-2008-1018.html
http://www.redhat.com/support/errata/RHSA-2009-0015.html
http://www.securitytracker.com/id?1021307
http://secunia.com/advisories/32991
http://secunia.com/advisories/33015
http://secunia.com/advisories/33528
http://secunia.com/advisories/33709
http://secunia.com/advisories/34233
http://secunia.com/advisories/34259
http://secunia.com/advisories/37386
http://secunia.com/advisories/38539
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019798.1-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-246366-1
SuSE Security Announcement: SUSE-SR:2009:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
http://www.vupen.com/english/advisories/2008/3339
http://www.vupen.com/english/advisories/2009/0672
XForce ISS Database: jre-jaxws-jaxb-privilege-escalation(47068)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47068
Common Vulnerability Exposure (CVE) ID: CVE-2008-5348
http://osvdb.org/50505
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6549
RedHat Security Advisories: RHSA-2008:1025
http://rhn.redhat.com/errata/RHSA-2008-1025.html
http://www.redhat.com/support/errata/RHSA-2009-0016.html
http://www.redhat.com/support/errata/RHSA-2009-0445.html
RedHat Security Advisories: RHSA-2009:0466
https://rhn.redhat.com/errata/RHSA-2009-0466.html
http://secunia.com/advisories/33710
http://secunia.com/advisories/34605
http://secunia.com/advisories/34889
http://secunia.com/advisories/34972
http://secunia.com/advisories/35065
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019797.1-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-246346-1
SuSE Security Announcement: SUSE-SA:2009:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html
SuSE Security Announcement: SUSE-SA:2009:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html
SuSE Security Announcement: SUSE-SR:2009:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
Common Vulnerability Exposure (CVE) ID: CVE-2008-5349
HPdes Security Advisory: HPSBMA02429
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133
HPdes Security Advisory: HPSBUX02429
http://www.securityfocus.com/archive/1/504010/100/0/threaded
HPdes Security Advisory: SSRT090058
http://osvdb.org/50504
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5843
http://www.securitytracker.com/id?1021309
http://secunia.com/advisories/35255
http://sunsolve.sun.com/search/document.do?assetkey=1-26-246286-1
SuSE Security Announcement: SUSE-SR:2009:016 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
SuSE Security Announcement: SUSE-SR:2009:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
http://www.vupen.com/english/advisories/2009/1426
XForce ISS Database: sun-jre-rsa-dos(47064)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47064
Common Vulnerability Exposure (CVE) ID: CVE-2008-5350
http://osvdb.org/50503
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6424
http://www.securitytracker.com/id?1021310
http://sunsolve.sun.com/search/document.do?assetkey=1-26-246266-1
Common Vulnerability Exposure (CVE) ID: CVE-2008-5351
http://osvdb.org/50502
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6212
http://www.redhat.com/support/errata/RHSA-2009-0369.html
http://www.securitytracker.com/id?1021311
http://secunia.com/advisories/34447
http://sunsolve.sun.com/search/document.do?assetkey=1-26-245246-1
Common Vulnerability Exposure (CVE) ID: CVE-2008-5352
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=759
http://osvdb.org/50501
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6383
http://www.securitytracker.com/id?1021312
http://sunsolve.sun.com/search/document.do?assetkey=1-26-244992-1
Common Vulnerability Exposure (CVE) ID: CVE-2008-5353
Bugtraq: 20090524 Hardening OSX against CVE-2008-5353 (Google Search)
http://www.securityfocus.com/archive/1/503797/100/0/threaded
http://blog.cr0.org/2009/05/write-once-own-everyone.html
http://landonf.bikemonkey.org/code/macosx/CVE-2008-5353.20090519.html
http://osvdb.org/50500
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6511
http://www.securitytracker.com/id?1021313
http://secunia.com/advisories/35118
http://sunsolve.sun.com/search/document.do?assetkey=1-26-244991-1
http://www.vupen.com/english/advisories/2009/1391
Common Vulnerability Exposure (CVE) ID: CVE-2008-5354
http://www.ximido.de/research/advisories/SM_Java-BO_200811.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6537
http://sunsolve.sun.com/search/document.do?assetkey=1-26-244990-1
XForce ISS Database: jre-commandline-privilege-escalation(47060)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47060
Common Vulnerability Exposure (CVE) ID: CVE-2008-5358
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=758
http://osvdb.org/50515
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6319
http://secunia.com/advisories/33187
http://sunsolve.sun.com/search/document.do?assetkey=1-26-244987-1
XForce ISS Database: jre-gif-images-privilege-escalation(47049)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47049
Common Vulnerability Exposure (CVE) ID: CVE-2008-5359
http://www.zerodayinitiative.com/advisories/ZDI-08-080/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5841
XForce ISS Database: jre-image-processing-privilege-escalation(47048)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47048
Common Vulnerability Exposure (CVE) ID: CVE-2008-5360
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6596
http://www.securitytracker.com/id?1021316
http://sunsolve.sun.com/search/document.do?assetkey=1-26-244986-1
XForce ISS Database: jre-guessable-file-unauth-access(47045)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47045
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.