Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2017.3440.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2017:3440-1) |
Summary: | The remote host is missing an update for the 'java-1_7_1-ibm' package(s) announced via the SUSE-SU-2017:3440-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'java-1_7_1-ibm' package(s) announced via the SUSE-SU-2017:3440-1 advisory. Vulnerability Insight: This update for java-1_7_1-ibm fixes the following issues: * CVE-2017-10349: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9, Java SE Embedded: 8u144, JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).' * CVE-2017-10348: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9, Java SE Embedded: 8u144, JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).' * CVE-2017-10388: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9, Java SE Embedded: 8u144, JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'java-1_7_1-ibm' package(s) on SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Software Development Kit 11-SP4. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-9841 BugTraq ID: 95131 http://www.securityfocus.com/bid/95131 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html https://bugzilla.redhat.com/show_bug.cgi?id=1402346 https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb https://security.netapp.com/advisory/ntap-20171019-0001/ https://support.apple.com/HT208112 https://support.apple.com/HT208113 https://support.apple.com/HT208115 https://support.apple.com/HT208144 https://security.gentoo.org/glsa/201701-56 https://security.gentoo.org/glsa/202007-54 https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib https://wiki.mozilla.org/images/0/09/Zlib-report.pdf https://www.oracle.com/security-alerts/cpujul2020.html https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html http://www.openwall.com/lists/oss-security/2016/12/05/21 RedHat Security Advisories: RHSA-2017:1220 https://access.redhat.com/errata/RHSA-2017:1220 RedHat Security Advisories: RHSA-2017:1221 https://access.redhat.com/errata/RHSA-2017:1221 RedHat Security Advisories: RHSA-2017:1222 https://access.redhat.com/errata/RHSA-2017:1222 RedHat Security Advisories: RHSA-2017:2999 https://access.redhat.com/errata/RHSA-2017:2999 RedHat Security Advisories: RHSA-2017:3046 https://access.redhat.com/errata/RHSA-2017:3046 RedHat Security Advisories: RHSA-2017:3047 https://access.redhat.com/errata/RHSA-2017:3047 RedHat Security Advisories: RHSA-2017:3453 https://access.redhat.com/errata/RHSA-2017:3453 http://www.securitytracker.com/id/1039427 http://www.securitytracker.com/id/1039596 SuSE Security Announcement: openSUSE-SU-2016:3202 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html SuSE Security Announcement: openSUSE-SU-2017:0077 (Google Search) http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html SuSE Security Announcement: openSUSE-SU-2017:0080 (Google Search) http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html https://usn.ubuntu.com/4246-1/ https://usn.ubuntu.com/4292-1/ |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |