RHEL 4 / 5 : java-1.5.0-ibm (RHSA-2007:1041)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated java-1.5.0-ibm packages that fix several security issues are
now available for Red Hat Enterprise Linux 4 Extras and 5
Supplementary.

This update has been rated as having important security impact by the
Red Hat Security Response Team.

IBM's 1.5.0 Java release includes the IBM Java 2 Runtime Environment
and the IBM Java 2 Software Development Kit.

The applet caching mechanism of the Java Runtime Environment (JRE) did
not correctly process the creation of network connections. A remote
attacker could use this flaw to create connections to services on
machines other than the one that the applet was downloaded from.
(CVE-2007-5232)

Multiple vulnerabilities existed in Java Web Start allowing an
untrusted application to determine the location of the Java Web Start
cache. (CVE-2007-5238)

Untrusted Java Web Start Applications or Java Applets were able to
drag and drop a file to a Desktop Application. A user-assisted remote
attacker could use this flaw to move or copy arbitrary files.
(CVE-2007-5239)

The Java Runtime Environment allowed untrusted Java Applets or
applications to display oversized Windows. This could be used by
remote attackers to hide security warning banners. (CVE-2007-5240)

Unsigned Java Applets communicating via a HTTP proxy could allow a
remote attacker to violate the Java security model. A cached malicious
Applet could create network connections to services on other machines.
(CVE-2007-5273)

Unsigned Applets loaded with Mozilla Firefox or Opera browsers allowed
remote attackers to violate the Java security model. A cached
malicious Applet could create network connections to services on other
machines. (CVE-2007-5274)

All users of java-ibm-1.5.0 are advised to upgrade to these updated
packages, that contain IBM's 1.5.0 SR6 Java release which resolves
these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2007-5232.html
https://www.redhat.com/security/data/cve/CVE-2007-5238.html
https://www.redhat.com/security/data/cve/CVE-2007-5239.html
https://www.redhat.com/security/data/cve/CVE-2007-5240.html
https://www.redhat.com/security/data/cve/CVE-2007-5273.html
https://www.redhat.com/security/data/cve/CVE-2007-5274.html
http://rhn.redhat.com/errata/RHSA-2007-1041.html

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 40710 ()

Bugtraq ID:

CVE ID: CVE-2007-5232
CVE-2007-5238
CVE-2007-5239
CVE-2007-5240
CVE-2007-5273
CVE-2007-5274