RHEL 4 / 5 : java-1.5.0-bea (RHSA-2008:0156)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated java-1.5.0-bea packages that correct several security issues
are now available for Red Hat Enterprise Linux 4 Extras and 5
Supplementary.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

The BEA WebLogic JRockit 1.5.0_14 JRE and SDK contain BEA WebLogic
JRockit Virtual Machine 1.5.0_14 and are certified for the Java 5
Platform, Standard Edition, v1.5.0.

A flaw in the applet caching mechanism of the Java Runtime Environment
(JRE) did not correctly process the creation of network connections. A
remote attacker could use this flaw to create connections to services
on machines other than the one that the applet was downloaded from.
(CVE-2007-5232)

Untrusted Java Applets were able to drag and drop a file to a Desktop
Application. A user-assisted remote attacker could use this flaw to
move or copy arbitrary files. (CVE-2007-5239)

The Java Runtime Environment (JRE) allowed untrusted Java Applets or
applications to display oversized windows. This could be used by
remote attackers to hide security warning banners. (CVE-2007-5240)

Unsigned Java Applets communicating via a HTTP proxy could allow a
remote attacker to violate the Java security model. A cached,
malicious Applet could create network connections to services on other
machines. (CVE-2007-5273)

Two vulnerabilities in the Java Runtime Environment allowed an
untrusted application or applet to elevate the assigned privileges.
This could be misused by a malicious website to read and write local
files or execute local applications in the context of the user running
the Java process. (CVE-2008-0657)

Those vulnerabilities concerned with applets can only be triggered in
java-1.5.0-bea by calling the 'appletviewer' application.

All users of java-1.5.0-bea should upgrade to these updated packages,
which contain the BEA WebLogic JRockit 1.5.0_14 release that resolves
these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2007-5232.html
https://www.redhat.com/security/data/cve/CVE-2007-5239.html
https://www.redhat.com/security/data/cve/CVE-2007-5240.html
https://www.redhat.com/security/data/cve/CVE-2007-5273.html
https://www.redhat.com/security/data/cve/CVE-2008-0657.html
http://www.nessus.org/u?7dd1a2b1
http://rhn.redhat.com/errata/RHSA-2008-0156.html

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 40716 ()

Bugtraq ID:

CVE ID: CVE-2007-5232
CVE-2007-5239
CVE-2007-5240
CVE-2007-5273
CVE-2008-0657