语言:
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.nessus.org/u?8f150397
https://access.redhat.com/errata/RHSA-2012:0006
https://access.redhat.com/security/updates/classification/#critical
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://bugzilla.redhat.com/show_bug.cgi?id=745379
https://bugzilla.redhat.com/show_bug.cgi?id=745387
https://bugzilla.redhat.com/show_bug.cgi?id=745397
https://bugzilla.redhat.com/show_bug.cgi?id=745459
https://bugzilla.redhat.com/show_bug.cgi?id=745464
https://bugzilla.redhat.com/show_bug.cgi?id=745473
严重性: High
ID: 57464
文件名: redhat-RHSA-2012-0006.nasl
版本: 1.31
类型: local
代理: unix
发布时间: 2012/1/10
最近更新时间: 2024/4/27
支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
风险因素: Critical
分数: 9.0
风险因素: Critical
基本分数: 10
时间分数: 8.7
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2011-3549
风险因素: High
基本分数: 7.5
时间分数: 7.2
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CVSS 分数来源: CVE-2011-3389
CPE: p-cpe:/a:redhat:enterprise_linux:java-1.4.2-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.4.2-ibm-demo, p-cpe:/a:redhat:enterprise_linux:java-1.4.2-ibm-devel, p-cpe:/a:redhat:enterprise_linux:java-1.4.2-ibm-javacomm, p-cpe:/a:redhat:enterprise_linux:java-1.4.2-ibm-jdbc, p-cpe:/a:redhat:enterprise_linux:java-1.4.2-ibm-plugin, p-cpe:/a:redhat:enterprise_linux:java-1.4.2-ibm-src, cpe:/o:redhat:enterprise_linux:5
必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可利用: true
易利用性: Exploits are available
补丁发布日期: 2012/1/9
漏洞发布日期: 2011/9/6
Metasploit (Java RMI Server Insecure Default Configuration Java Code Execution)
CVE: CVE-2011-3389, CVE-2011-3545, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560
BID: 49388, 49778, 50211, 50220, 50223, 50231, 50234, 50236, 50243, 50248
RHSA: 2012:0006