English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75096 CVE descriptions
and 39644 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63748
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-748-1 (openjdk-6)
Summary:Ubuntu USN-748-1 (openjdk-6)
Description:The remote host is missing an update to openjdk-6
announced via advisory USN-748-1.

Details follow:

It was discovered that font creation could leak temporary files.
If a user were tricked into loading a malicious program or applet,
a remote attacker could consume disk space, leading to a denial of
service. (CVE-2006-2426, CVE-2009-1100)

It was discovered that the lightweight HttpServer did not correctly close
files on dataless connections. A remote attacker could send specially
crafted requests, leading to a denial of service. (CVE-2009-1101)

Certain 64bit Java actions would crash an application. A local attacker
might be able to cause a denial of service. (CVE-2009-1102)

It was discovered that LDAP connections did not close correctly.
A remote attacker could send specially crafted requests, leading to a
denial of service. (CVE-2009-1093)

Java LDAP routines did not unserialize certain data correctly. A remote
attacker could send specially crafted requests that could lead to
arbitrary code execution. (CVE-2009-1094)

Java did not correctly check certain JAR headers. If a user or
automated system were tricked into processing a malicious JAR file,
a remote attacker could crash the application, leading to a denial of
service. (CVE-2009-1095, CVE-2009-1096)

It was discovered that PNG and GIF decoding in Java could lead to memory
corruption. If a user or automated system were tricked into processing
a specially crafted image, a remote attacker could crash the application,
leading to a denial of service. (CVE-2009-1097, CVE-2009-1098)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
icedtea6-plugin 6b12-0ubuntu6.4
openjdk-6-jdk 6b12-0ubuntu6.4
openjdk-6-jre 6b12-0ubuntu6.4
openjdk-6-jre-headless 6b12-0ubuntu6.4
openjdk-6-jre-lib 6b12-0ubuntu6.4

After a standard system upgrade you need to restart any Java applications
to effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-748-1
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-2426
Bugtraq: 20060514 JDK 1.4.2_11, 1.5.0_06, unsigned applets consuming all free harddisk space (Google Search)
http://www.securityfocus.com/archive/1/archive/1/434001/100/0/threaded
http://www.illegalaccess.org/exploit/FullDiskApplet.html
Debian Security Information: DSA-1769 (Google Search)
http://www.debian.org/security/2009/dsa-1769
http://www.mandriva.com/security/advisories?name=MDVSA-2009:137
http://www.mandriva.com/security/advisories?name=MDVSA-2009:162
http://www.redhat.com/support/errata/RHSA-2009-0392.html
http://www.redhat.com/support/errata/RHSA-2009-0394.html
RedHat Security Advisories: RHSA-2009:0377
https://rhn.redhat.com/errata/RHSA-2009-0377.html
SuSE Security Announcement: SUSE-SR:2006:012 (Google Search)
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.ubuntu.com/usn/usn-748-1
BugTraq ID: 17981
http://www.securityfocus.com/bid/17981
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10609
http://secunia.com/advisories/34489
http://secunia.com/advisories/34495
http://secunia.com/advisories/34496
http://secunia.com/advisories/34675
http://secunia.com/advisories/34632
http://www.vupen.com/english/advisories/2006/1824
http://www.osvdb.org/25561
http://secunia.com/advisories/20132
http://secunia.com/advisories/20457
http://securityreason.com/securityalert/909
XForce ISS Database: sun-java-fontcreatefont-dos(26493)
http://xforce.iss.net/xforce/xfdb/26493
Common Vulnerability Exposure (CVE) ID: CVE-2009-1093
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-19-1
http://security.gentoo.org/glsa/glsa-200911-02.xml
HPdes Security Advisory: HPSBMA02429
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133
HPdes Security Advisory: SSRT090058
HPdes Security Advisory: HPSBUX02429
http://marc.info/?l=bugtraq&m=124344236532162&w=2
http://www.redhat.com/support/errata/RHSA-2009-1038.html
RedHat Security Advisories: RHSA-2009:1198
https://rhn.redhat.com/errata/RHSA-2009-1198.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-254569-1
SuSE Security Announcement: SUSE-SA:2009:016 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00001.html
SuSE Security Announcement: SUSE-SA:2009:029 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00003.html
SuSE Security Announcement: SUSE-SR:2009:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
SuSE Security Announcement: SUSE-SA:2009:036 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00001.html
BugTraq ID: 34240
http://www.securityfocus.com/bid/34240
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11343
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6676
http://www.securitytracker.com/id?1021893
http://secunia.com/advisories/35223
http://secunia.com/advisories/35156
http://secunia.com/advisories/35255
http://secunia.com/advisories/35416
http://secunia.com/advisories/35776
http://secunia.com/advisories/36185
http://secunia.com/advisories/37386
http://secunia.com/advisories/37460
http://www.vupen.com/english/advisories/2009/1426
http://www.vupen.com/english/advisories/2009/3316
Common Vulnerability Exposure (CVE) ID: CVE-2009-1094
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11064
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6598
http://www.vupen.com/english/advisories/2009/1900
Common Vulnerability Exposure (CVE) ID: CVE-2009-1095
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=781
http://sunsolve.sun.com/search/document.do?assetkey=1-21-125137-14-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-254570-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020225.1-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10124
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6643
http://www.securitytracker.com/id?1021894
Common Vulnerability Exposure (CVE) ID: CVE-2009-1096
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6659
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8844
Common Vulnerability Exposure (CVE) ID: CVE-2009-1097
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=780
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=779
http://sunsolve.sun.com/search/document.do?assetkey=1-26-254571-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11241
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6288
http://www.securitytracker.com/id?1021913
XForce ISS Database: jre-gif-file-bo(49475)
http://xforce.iss.net/xforce/xfdb/49475
Common Vulnerability Exposure (CVE) ID: CVE-2009-1098
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6008
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9956
Common Vulnerability Exposure (CVE) ID: CVE-2009-1100
http://sunsolve.sun.com/search/document.do?assetkey=1-66-254608-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6224
http://www.securitytracker.com/id?1021917
Common Vulnerability Exposure (CVE) ID: CVE-2009-1101
http://sunsolve.sun.com/search/document.do?assetkey=1-66-254609-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10152
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6412
http://www.securitytracker.com/id?1021918
Common Vulnerability Exposure (CVE) ID: CVE-2009-1102
http://sunsolve.sun.com/search/document.do?assetkey=1-66-254610-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10300
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6722
http://www.securitytracker.com/id?1021919
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.