RHEL 4 / 5 : java-1.5.0-sun (RHSA-2009:1571)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated java-1.5.0-sun packages that correct several security issues
are now available for Red Hat Enterprise Linux 4 Extras and 5
Supplementary.

This update has been rated as having critical security impact by the
Red Hat Security Response Team.

The Sun 1.5.0 Java release includes the Sun Java 5 Runtime Environment
and the Sun Java 5 Software Development Kit.

This update fixes several vulnerabilities in the Sun Java 5 Runtime
Environment and the Sun Java 5 Software Development Kit. These
vulnerabilities are summarized on the 'Advance notification of
Security Updates for Java SE' page from Sun Microsystems, listed in
the References section. (CVE-2009-2409, CVE-2009-3728, CVE-2009-3873,
CVE-2009-3876, CVE-2009-3877, CVE-2009-3879, CVE-2009-3880,
CVE-2009-3881, CVE-2009-3882, CVE-2009-3883, CVE-2009-3884)

Note: This is the final update for the java-1.5.0-sun packages, as the
Sun Java SE Release family 5.0 has now reached End of Service Life.
The next update will remove the java-1.5.0-sun packages.

An alternative to Sun Java SE 5.0 is the Java 2 Technology Edition of
the IBM Developer Kit for Linux, which is available from the Extras
and Supplementary channels on the Red Hat Network. For users of
applications that are capable of using the Java 6 runtime, the OpenJDK
open source JDK is included in Red Hat Enterprise Linux 5 (since 5.3)
and is supported by Red Hat.

Users of java-1.5.0-sun should upgrade to these updated packages,
which correct these issues. All running instances of Sun Java must be
restarted for the update to take effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2009-2409.html
https://www.redhat.com/security/data/cve/CVE-2009-3728.html
https://www.redhat.com/security/data/cve/CVE-2009-3867.html
https://www.redhat.com/security/data/cve/CVE-2009-3868.html
https://www.redhat.com/security/data/cve/CVE-2009-3869.html
https://www.redhat.com/security/data/cve/CVE-2009-3871.html
https://www.redhat.com/security/data/cve/CVE-2009-3873.html
https://www.redhat.com/security/data/cve/CVE-2009-3874.html
https://www.redhat.com/security/data/cve/CVE-2009-3875.html
https://www.redhat.com/security/data/cve/CVE-2009-3876.html
https://www.redhat.com/security/data/cve/CVE-2009-3877.html
https://www.redhat.com/security/data/cve/CVE-2009-3879.html
https://www.redhat.com/security/data/cve/CVE-2009-3880.html
https://www.redhat.com/security/data/cve/CVE-2009-3881.html
https://www.redhat.com/security/data/cve/CVE-2009-3882.html
https://www.redhat.com/security/data/cve/CVE-2009-3883.html
https://www.redhat.com/security/data/cve/CVE-2009-3884.html
http://www.nessus.org/u?6212b694
http://rhn.redhat.com/errata/RHSA-2009-1571.html

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true