RHEL 5 / 6:java-1.7.0-ibm (RHSA-2013:0822)

critical Nessus 插件 ID 66439

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

更新后的 java-1.7.0-ibm 程序包修复了多个安全问题,现在可用于 Red Hat Enterprise Linux 5 和 6 Supplementary。

Red Hat 安全响应团队已将此更新评级为具有严重安全影响。可从“参考”部分中的 CVE 链接获取针对每个漏洞的通用漏洞评分系统 (CVSS) 基本分数,其给出了详细的严重性等级。

IBM Java SE 版本 7 包括 IBM Java Runtime Environment 和 IBM Java 软件开发工具包。

此更新修复了 IBM Java Runtime Environment 和 IBM Java 软件开发工具包中的多个漏洞。详细的漏洞描述信息链接自 IBM“安全警报”页面,此页面列于“参考”部分中。CVE-2013-0169、CVE-2013-0401、CVE-2013-1488、CVE-2013-1491、CVE-2013-1537、CVE-2013-1540、CVE-2013-1557、CVE-2013-1558、CVE-2013-1563、CVE-2013-1569、CVE-2013-2383、CVE-2013-2384、CVE-2013-2394、CVE-2013-2415、CVE-2013-2416、CVE-2013-2417、CVE-2013-2418、CVE-2013-2419、CVE-2013-2420、CVE-2013-2422、CVE-2013-2423、CVE-2013-2424、CVE-2013-2426、CVE-2013-2429、CVE-2013-2430、CVE-2013-2432、CVE-2013-2433、CVE-2013-2434、CVE-2013-2435、CVE-2013-2436、CVE-2013-2438、CVE-2013-2440

建议所有 java-1.7.0-ibm 用户升级到这些到更新后的程序包,其中包含 IBM Java SE 7 SR4-FP2 版本。必须重新启动所有正在运行的 IBM Java 实例才能使更新生效。

解决方案

更新受影响的数据包。

另见

https://access.redhat.com/security/cve/cve-2013-2424

https://access.redhat.com/security/cve/cve-2013-2426

https://access.redhat.com/security/cve/cve-2013-2429

https://access.redhat.com/security/cve/cve-2013-1558

https://access.redhat.com/security/cve/cve-2013-1557

https://access.redhat.com/security/cve/cve-2013-2440

https://access.redhat.com/security/cve/cve-2013-1491

https://developer.ibm.com/javasdk/support/security-vulnerabilities/

https://access.redhat.com/errata/RHSA-2013:0822

https://access.redhat.com/security/cve/cve-2013-0169

https://access.redhat.com/security/cve/cve-2013-2418

https://access.redhat.com/security/cve/cve-2013-2394

https://access.redhat.com/security/cve/cve-2013-2416

https://access.redhat.com/security/cve/cve-2013-2432

https://access.redhat.com/security/cve/cve-2013-2433

https://access.redhat.com/security/cve/cve-2013-2434

https://access.redhat.com/security/cve/cve-2013-2435

https://access.redhat.com/security/cve/cve-2013-2438

https://access.redhat.com/security/cve/cve-2013-1540

https://access.redhat.com/security/cve/cve-2013-1563

https://access.redhat.com/security/cve/cve-2013-2419

https://access.redhat.com/security/cve/cve-2013-1537

https://access.redhat.com/security/cve/cve-2013-2415

https://access.redhat.com/security/cve/cve-2013-2417

https://access.redhat.com/security/cve/cve-2013-2430

https://access.redhat.com/security/cve/cve-2013-2436

https://access.redhat.com/security/cve/cve-2013-1488

https://access.redhat.com/security/cve/cve-2013-0401

https://access.redhat.com/security/cve/cve-2013-1569

https://access.redhat.com/security/cve/cve-2013-2383

https://access.redhat.com/security/cve/cve-2013-2384

https://access.redhat.com/security/cve/cve-2013-2420

https://access.redhat.com/security/cve/cve-2013-2423

https://access.redhat.com/security/cve/cve-2013-2422

插件详情

严重性: Critical

ID: 66439

文件名: redhat-RHSA-2013-0822.nasl

版本: 1.34

类型: local

代理: unix

发布时间: 2013/5/15

最近更新时间: 2022/12/5

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

风险信息

VPR

风险因素: Critical

分数: 9.8

CVSS v2

风险因素: Critical

基本分数: 10

时间分数: 8.7

矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS 分数来源: CVE-2013-2440

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-demo, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-devel, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-jdbc, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-plugin, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-src, cpe:/o:redhat:enterprise_linux:5.9, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.4, cpe:/o:redhat:enterprise_linux:6.5

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2013/5/14

漏洞发布日期: 2013/2/8

CISA 已知可遭利用的漏洞到期日期: 2022/6/15

可利用的方式

CANVAS (CANVAS)

Core Impact

Metasploit (Java Applet Reflection Type Confusion Remote Code Execution)

参考资料信息

CVE: CVE-2013-0169, CVE-2013-0401, CVE-2013-1488, CVE-2013-1491, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1563, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2415, CVE-2013-2416, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2426, CVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2434, CVE-2013-2435, CVE-2013-2436, CVE-2013-2438, CVE-2013-2440

BID: 57778, 58493, 58504, 58507, 59088, 59089, 59124, 59131, 59137, 59145, 59149, 59154, 59159, 59162, 59166, 59167, 59170, 59172, 59179, 59184, 59185, 59187, 59190, 59194, 59206, 59208, 59212, 59213, 59219, 59220, 59228, 59243

RHSA: 2013:0822