RHEL 5 / 6:java-1.7.0-ibm (RHSA-2013:1060)

critical Nessus Plugin ID 68901
新推出!弱點優先順序評分 (VPR)

Tenable 會為每個弱點計算動態 VPR。VPR 將弱點資訊與威脅情報和機器學習演算法加以結合,藉此預測攻擊者最有可能利用哪些弱點發動攻擊。查看詳細資訊: VPR 是什麼?它跟 CVSS 有何不同?

VPR 評分: 9.4

Synopsis

遠端 Red Hat 主機缺少一個或多個安全性更新。

描述

現已提供適用於 Red Hat Enterprise Linux 5 和 6 Supplementary 的更新版 java-1.7.0-ibm 套件,可修正數個安全性問題。

Red Hat 安全性回應團隊已將此更新評為具有重大安全性影響。可針對每個弱點從〈參照〉一節的 CVE 連結中取得常見弱點評分系統 (CVSS) 的基本分數,其中包含有關嚴重性評等的詳細資訊。

IBM Java SE 版本 7 包含 IBM Java Runtime Environment 和 IBM Java Software Development Kit。

此更新可修正 IBM Java Runtime Environment 和 IBM Java Software Development Kit 中的數個弱點。IBM 「安全性警示」頁面會詳細說明這些弱點,如<參照>一節中所列。(CVE-2013-1500、CVE-2013-1571、CVE-2013-2400、CVE-2013-2407、CVE-2013-2412、CVE-2013-2437、CVE-2013-2442、CVE-2013-2444、CVE-2013-2446、CVE-2013-2447、CVE-2013-2448、CVE-2013-2449、CVE-2013-2450、CVE-2013-2451、CVE-2013-2452、CVE-2013-2453、CVE-2013-2454、CVE-2013-2455、CVE-2013-2456、CVE-2013-2457、CVE-2013-2458、CVE-2013-2459、CVE-2013-2460、CVE-2013-2462、CVE-2013-2463、CVE-2013-2464、CVE-2013-2465、CVE-2013-2466、CVE-2013-2468、CVE-2013-2469、CVE-2013-2470、CVE-2013-2471、CVE-2013-2472、CVE-2013-2473、CVE-2013-3744)

Red Hat 要感謝 Tim Brown 報告 CVE-2013-1500,並感謝 US-CERT 報告 CVE-2013-1571。US-CERT 確認 Oracle 為 CVE-2013-1571 的原始報告者。

建議所有 java-1.7.0-ibm 使用者皆升級至這些更新版套件,其中包含 IBM Java SE 7 SR5 版本。所有執行中的 IBM Java 執行個體都必須重新啟動,更新才能生效。

解決方案

更新受影響的套件。

另請參閱

https://developer.ibm.com/javasdk/support/security-vulnerabilities/

https://access.redhat.com/errata/RHSA-2013:1060

https://access.redhat.com/security/cve/cve-2013-2465

https://access.redhat.com/security/cve/cve-2013-1571

https://access.redhat.com/security/cve/cve-2013-2472

https://access.redhat.com/security/cve/cve-2013-2412

https://access.redhat.com/security/cve/cve-2013-2454

https://access.redhat.com/security/cve/cve-2013-2455

https://access.redhat.com/security/cve/cve-2013-2456

https://access.redhat.com/security/cve/cve-2013-2457

https://access.redhat.com/security/cve/cve-2013-2450

https://access.redhat.com/security/cve/cve-2013-2452

https://access.redhat.com/security/cve/cve-2013-2453

https://access.redhat.com/security/cve/cve-2013-2458

https://access.redhat.com/security/cve/cve-2013-2459

https://access.redhat.com/security/cve/cve-2013-2470

https://access.redhat.com/security/cve/cve-2013-2471

https://access.redhat.com/security/cve/cve-2013-2473

https://access.redhat.com/security/cve/cve-2013-2447

https://access.redhat.com/security/cve/cve-2013-2446

https://access.redhat.com/security/cve/cve-2013-2463

https://access.redhat.com/security/cve/cve-2013-2407

https://access.redhat.com/security/cve/cve-2013-1500

https://access.redhat.com/security/cve/cve-2013-2449

https://access.redhat.com/security/cve/cve-2013-2448

https://access.redhat.com/security/cve/cve-2013-2469

https://access.redhat.com/security/cve/cve-2013-2460

https://access.redhat.com/security/cve/cve-2013-2444

https://access.redhat.com/security/cve/cve-2013-2451

https://access.redhat.com/security/cve/cve-2013-2464

https://access.redhat.com/security/cve/cve-2013-2462

https://access.redhat.com/security/cve/cve-2013-2400

https://access.redhat.com/security/cve/cve-2013-2468

https://access.redhat.com/security/cve/cve-2013-2442

https://access.redhat.com/security/cve/cve-2013-2466

https://access.redhat.com/security/cve/cve-2013-3744

https://access.redhat.com/security/cve/cve-2013-2437

https://access.redhat.com/security/cve/cve-2013-3009

https://access.redhat.com/security/cve/cve-2013-3011

https://access.redhat.com/security/cve/cve-2013-3012

https://access.redhat.com/security/cve/cve-2013-3006

https://access.redhat.com/security/cve/cve-2013-3007

https://access.redhat.com/security/cve/cve-2013-3008

https://access.redhat.com/security/cve/cve-2013-3010

https://access.redhat.com/security/cve/cve-2013-4002

Plugin 詳細資訊

嚴重性: Critical

ID: 68901

檔案名稱: redhat-RHSA-2013-1060.nasl

版本: 1.41

類型: local

代理程式: unix

已發布: 2013/7/16

已更新: 2021/1/14

相依性: ssh_get_info.nasl

風險資訊

風險因素: Critical

VPR 評分: 9.4

CVSS v2.0

基本分數: 10

時間分數: 8.7

媒介: AV:N/AC:L/Au:N/C:C/I:C/A:C

時間媒介: E:H/RL:OF/RC:C

弱點資訊

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-demo, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-devel, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-jdbc, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-plugin, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-src, cpe:/o:redhat:enterprise_linux:5.9, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.4, cpe:/o:redhat:enterprise_linux:6.5

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2013/7/15

弱點發布日期: 2013/6/18

惡意利用途徑

Core Impact

Metasploit (Java storeImageArray() Invalid Array Indexing Vulnerability)

參考資訊

CVE: CVE-2013-1500, CVE-2013-1571, CVE-2013-2400, CVE-2013-2407, CVE-2013-2412, CVE-2013-2437, CVE-2013-2442, CVE-2013-2444, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2449, CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458, CVE-2013-2459, CVE-2013-2460, CVE-2013-2462, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473, CVE-2013-3006, CVE-2013-3007, CVE-2013-3008, CVE-2013-3009, CVE-2013-3010, CVE-2013-3011, CVE-2013-3012, CVE-2013-3744, CVE-2013-4002

BID: 60617, 60618, 60619, 60620, 60621, 60622, 60623, 60624, 60625, 60627, 60629, 60630, 60631, 60632, 60633, 60634, 60635, 60636, 60637, 60638, 60640, 60641, 60643, 60644, 60647, 60650, 60651, 60652, 60653, 60654, 60655, 60656, 60657, 60658, 60659

RHSA: 2013:1060