RHEL 4 / 5 : java-1.5.0-ibm (RHSA-2008:0790)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated java-1.5.0-ibm packages that fix several security issues are
now available for Red Hat Enterprise Linux 4 Extras and 5
Supplementary.

This update has been rated as having critical security impact by the
Red Hat Security Response Team.

The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment
and the IBM Java 2 Software Development Kit.

Multiple vulnerabilities with unsigned applets were reported. A remote
attacker could misuse an unsigned applet to connect to localhost
services running on the host running the applet. (CVE-2008-3104)

A vulnerability in the XML processing API was found. A remote attacker
who caused malicious XML to be processed by an untrusted applet or
application was able to elevate permissions to access URLs on a remote
host. (CVE-2008-3106)

A buffer overflow vulnerability was found in the font processing code.
This allowed remote attackers to extend the permissions of an
untrusted applet or application, allowing it to read and/or write
local files, as well as to execute local applications accessible to
the user running the untrusted application. (CVE-2008-3108)

Several buffer overflow vulnerabilities in Java Web Start were
reported. These vulnerabilities allowed an untrusted Java Web Start
application to elevate its privileges, allowing it to read and/or
write local files, as well as to execute local applications accessible
to the user running the untrusted application. (CVE-2008-3111)

Two file processing vulnerabilities in Java Web Start were found. A
remote attacker, by means of an untrusted Java Web Start application,
was able to create or delete arbitrary files with the permissions of
the user running the untrusted application. (CVE-2008-3112,
CVE-2008-3113)

A vulnerability in Java Web Start when processing untrusted
applications was reported. An attacker was able to acquire sensitive
information, such as the cache location. (CVE-2008-3114)

All users of java-1.5.0-ibm are advised to upgrade to these updated
packages, that contain the IBM 1.5.0 SR8 Java release, which resolves
these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2008-3104.html
https://www.redhat.com/security/data/cve/CVE-2008-3106.html
https://www.redhat.com/security/data/cve/CVE-2008-3108.html
https://www.redhat.com/security/data/cve/CVE-2008-3111.html
https://www.redhat.com/security/data/cve/CVE-2008-3112.html
https://www.redhat.com/security/data/cve/CVE-2008-3113.html
https://www.redhat.com/security/data/cve/CVE-2008-3114.html
http://rhn.redhat.com/errata/RHSA-2008-0790.html

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 40725 ()

Bugtraq ID:

CVE ID: CVE-2008-3104
CVE-2008-3106
CVE-2008-3108
CVE-2008-3111
CVE-2008-3112
CVE-2008-3113
CVE-2008-3114