語系:
http://www.nessus.org/u?ab823eca
https://access.redhat.com/errata/RHSA-2013:0770
https://access.redhat.com/security/cve/cve-2013-2419
https://access.redhat.com/security/cve/cve-2013-1537
https://access.redhat.com/security/cve/cve-2013-1518
https://access.redhat.com/security/cve/cve-2013-2415
https://access.redhat.com/security/cve/cve-2013-2417
https://access.redhat.com/security/cve/cve-2013-2430
https://access.redhat.com/security/cve/cve-2013-2431
https://access.redhat.com/security/cve/cve-2013-1488
https://access.redhat.com/security/cve/cve-2013-0401
https://access.redhat.com/security/cve/cve-2013-1569
https://access.redhat.com/security/cve/cve-2013-2383
https://access.redhat.com/security/cve/cve-2013-2384
https://access.redhat.com/security/cve/cve-2013-2421
https://access.redhat.com/security/cve/cve-2013-2420
https://access.redhat.com/security/cve/cve-2013-2422
https://access.redhat.com/security/cve/cve-2013-2424
https://access.redhat.com/security/cve/cve-2013-2426
https://access.redhat.com/security/cve/cve-2013-2429
嚴重性: Critical
ID: 66212
檔案名稱: redhat-RHSA-2013-0770.nasl
版本: 1.27
類型: local
代理程式: unix
已發布: 2013/4/25
已更新: 2021/1/14
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
風險因素: Critical
分數: 9.8
風險因素: Critical
基本分數: 10
時間分數: 8.7
媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-debuginfo, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-demo, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-devel, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:5.9, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.4, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-javadoc, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-src
必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2013/4/24
弱點發布日期: 2013/3/8
Core Impact
Metasploit (Java Applet Driver Manager Privileged toString() Remote Code Execution)
CVE: CVE-2013-0401, CVE-2013-1488, CVE-2013-1518, CVE-2013-1537, CVE-2013-1557, CVE-2013-1558, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2415, CVE-2013-2417, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2424, CVE-2013-2426, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431
BID: 58504, 58507, 59131, 59141, 59153, 59159, 59165, 59166, 59167, 59170, 59179, 59184, 59187, 59190, 59194, 59206, 59212, 59219, 59228, 59243
RHSA: 2013:0770