Executive Summary

Summary
Title OpenJDK 8 vulnerabilities
Informations
Name USN-3473-1 First vendor Publication 2017-11-08
Vendor Ubuntu Last vendor Modification 2017-11-08
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10 - Ubuntu 17.04 - Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in OpenJDK 8.

Software Description: - openjdk-8: Open Source Java implementation

Details:

It was discovered that the Smart Card IO subsystem in OpenJDK did not properly maintain state. An attacker could use this to specially construct an untrusted Java application or applet to gain access to a smart card, bypassing sandbox restrictions. (CVE-2017-10274)

Gaston Traberg discovered that the Serialization component of OpenJDK did not properly limit the amount of memory allocated when performing deserializations. An attacker could use this to cause a denial of service (memory exhaustion). (CVE-2017-10281)

It was discovered that the Remote Method Invocation (RMI) component in OpenJDK did not properly handle unreferenced objects. An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions. (CVE-2017-10285)

It was discovered that the HTTPUrlConnection classes in OpenJDK did not properly handle newlines. An attacker could use this to convince a Java application or applet to inject headers into http requests. (CVE-2017-10295)

Francesco Palmarini, Marco Squarcina, Mauro Tempesta, and Riccardo Focardi discovered that the Serialization component of OpenJDK did not properly restrict the amount of memory allocated when deserializing objects from Java Cryptography Extension KeyStore (JCEKS). An attacker could use this to cause a denial of service (memory exhaustion). (CVE-2017-10345)

It was discovered that the Hotspot component of OpenJDK did not properly perform loader checks when handling the invokespecial JVM instruction. An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions. (CVE-2017-10346)

Gaston Traberg discovered that the Serialization component of OpenJDK did not properly limit the amount of memory allocated when performing deserializations in the SimpleTimeZone class. An attacker could use this to cause a denial of service (memory exhaustion). (CVE-2017-10347)

It was discovered that the Serialization component of OpenJDK did not properly limit the amount of memory allocated when performing deserializations. An attacker could use this to cause a denial of service (memory exhaustion). (CVE-2017-10348, CVE-2017-10357)

It was discovered that the JAXP component in OpenJDK did not properly limit the amount of memory allocated when performing deserializations. An attacker could use this to cause a denial of service (memory exhaustion). (CVE-2017-10349)

It was discovered that the JAX-WS component in OpenJDK did not properly limit the amount of memory allocated when performing deserializations. An attacker could use this to cause a denial of service (memory exhaustion). (CVE-2017-10350)

It was discovered that the Networking component of OpenJDK did not properly set timeouts on FTP client actions. A remote attacker could use this to cause a denial of service (application hang). (CVE-2017-10355)

Francesco Palmarini, Marco Squarcina, Mauro Tempesta, Riccardo Focardi, and Tobias Ospelt discovered that the Security component in OpenJDK did not sufficiently protect password-based encryption keys in key stores. An attacker could use this to expose sensitive information. (CVE-2017-10356)

Jeffrey Altman discovered that the Kerberos client implementation in OpenJDK incorrectly trusted unauthenticated portions of Kerberos tickets. A remote attacker could use this to impersonate trusted network services or perform other attacks. (CVE-2017-10388)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10:
openjdk-8-jdk 8u151-b12-0ubuntu0.17.10.2
openjdk-8-jdk-headless 8u151-b12-0ubuntu0.17.10.2
openjdk-8-jre 8u151-b12-0ubuntu0.17.10.2
openjdk-8-jre-headless 8u151-b12-0ubuntu0.17.10.2
openjdk-8-jre-zero 8u151-b12-0ubuntu0.17.10.2

Ubuntu 17.04:
openjdk-8-jdk 8u151-b12-0ubuntu0.17.04.2
openjdk-8-jdk-headless 8u151-b12-0ubuntu0.17.04.2
openjdk-8-jre 8u151-b12-0ubuntu0.17.04.2
openjdk-8-jre-headless 8u151-b12-0ubuntu0.17.04.2
openjdk-8-jre-zero 8u151-b12-0ubuntu0.17.04.2

Ubuntu 16.04 LTS:
openjdk-8-jdk 8u151-b12-0ubuntu0.16.04.2
openjdk-8-jdk-headless 8u151-b12-0ubuntu0.16.04.2
openjdk-8-jre 8u151-b12-0ubuntu0.16.04.2
openjdk-8-jre-headless 8u151-b12-0ubuntu0.16.04.2
openjdk-8-jre-jamvm 8u151-b12-0ubuntu0.16.04.2
openjdk-8-jre-zero 8u151-b12-0ubuntu0.16.04.2

This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications or applets to make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3473-1
CVE-2017-10274, CVE-2017-10281, CVE-2017-10285, CVE-2017-10295,
CVE-2017-10345, CVE-2017-10346, CVE-2017-10347, CVE-2017-10348,
CVE-2017-10349, CVE-2017-10350, CVE-2017-10355, CVE-2017-10356,
CVE-2017-10357, CVE-2017-10388

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-8/8u151-b12-0ubuntu0.17.10.2
https://launchpad.net/ubuntu/+source/openjdk-8/8u151-b12-0ubuntu0.17.04.2
https://launchpad.net/ubuntu/+source/openjdk-8/8u151-b12-0ubuntu0.16.04.2

Original Source

Url : http://www.ubuntu.com/usn/USN-3473-1

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 1
Application 1
Application 19
Application 1
Application 1
Application 1
Application 1
Application 1
Application 1
Application 1
Application 18
Application 1
Application 1
Application 2
Application 1
Application 2
Application 3
Application 2
Application 4
Application 4
Application 1
Application 1
Os 3
Os 2
Os 4
Os 2
Os 3
Os 3
Os 2
Os 2

Nessus® Vulnerability Scanner

Date Description
2018-08-17 Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2017-0040.nasl - Type : ACT_GATHER_INFO
2017-12-26 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2017-936.nasl - Type : ACT_GATHER_INFO
2017-12-18 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1331.nasl - Type : ACT_GATHER_INFO
2017-12-18 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1330.nasl - Type : ACT_GATHER_INFO
2017-12-15 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-3453.nasl - Type : ACT_GATHER_INFO
2017-12-08 Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZLSA-2017-3392.nasl - Type : ACT_GATHER_INFO
2017-12-07 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2017-3392.nasl - Type : ACT_GATHER_INFO
2017-12-07 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2017-3392.nasl - Type : ACT_GATHER_INFO
2017-12-07 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-3392.nasl - Type : ACT_GATHER_INFO
2017-12-07 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20171206_java_1_7_0_openjdk_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2017-11-29 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-3497-1.nasl - Type : ACT_GATHER_INFO
2017-11-29 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-3268.nasl - Type : ACT_GATHER_INFO
2017-11-29 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-3267.nasl - Type : ACT_GATHER_INFO
2017-11-28 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-3264.nasl - Type : ACT_GATHER_INFO
2017-11-27 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4048.nasl - Type : ACT_GATHER_INFO
2017-11-27 Name : The remote Debian host is missing a security update.
File : debian_DLA-1187.nasl - Type : ACT_GATHER_INFO
2017-11-20 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201711-14.nasl - Type : ACT_GATHER_INFO
2017-11-16 Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZLSA-2017-2998.nasl - Type : ACT_GATHER_INFO
2017-11-13 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2017-2989-1.nasl - Type : ACT_GATHER_INFO
2017-11-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-1269.nasl - Type : ACT_GATHER_INFO
2017-11-09 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-3473-1.nasl - Type : ACT_GATHER_INFO
2017-11-03 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4015.nasl - Type : ACT_GATHER_INFO
2017-11-02 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1273.nasl - Type : ACT_GATHER_INFO
2017-11-02 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1272.nasl - Type : ACT_GATHER_INFO
2017-11-01 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1255.nasl - Type : ACT_GATHER_INFO
2017-11-01 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1254.nasl - Type : ACT_GATHER_INFO
2017-10-30 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201710-31.nasl - Type : ACT_GATHER_INFO
2017-10-27 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2017-917.nasl - Type : ACT_GATHER_INFO
2017-10-25 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-3047.nasl - Type : ACT_GATHER_INFO
2017-10-25 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-3046.nasl - Type : ACT_GATHER_INFO
2017-10-24 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-2999.nasl - Type : ACT_GATHER_INFO
2017-10-23 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20171020_java_1_8_0_openjdk_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2017-10-23 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-2998.nasl - Type : ACT_GATHER_INFO
2017-10-23 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2017-2998.nasl - Type : ACT_GATHER_INFO
2017-10-23 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2017-2998.nasl - Type : ACT_GATHER_INFO
2017-10-19 Name : The remote Unix host contains a programming platform that is affected by mult...
File : oracle_java_cpu_oct_2017_unix.nasl - Type : ACT_GATHER_INFO
2017-10-19 Name : The remote Windows host contains a programming platform that is affected by m...
File : oracle_java_cpu_oct_2017.nasl - Type : ACT_GATHER_INFO
2017-10-18 Name : A programming platform installed on the remote Windows host is affected by mu...
File : oracle_jrockit_cpu_oct_2017.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2017-11-10 13:25:55
  • Multiple Updates
2017-11-08 13:23:27
  • First insertion