This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated java-1.4.2-ibm packages to correct several security issues are
now available for Red Hat Enterprise Linux 3 and 4 Extras.
This update has been rated as having critical security impact by the
Red Hat Security Response Team.
IBM's 1.4.2 SR7 Java release includes the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit.
A number of security issues were found :
Vulnerabilities were discovered in the Java Runtime Environment. An
untrusted applet could use these vulnerabilities to access data from
other applets. (CVE-2006-6736, CVE-2006-6737)
Serialization flaws were discovered in the Java Runtime Environment.
An untrusted applet or application could use these flaws to elevate
its privileges. (CVE-2006-6745)
Buffer overflow vulnerabilities were discovered in the Java Runtime
Environment. An untrusted applet could use these flaws to elevate its
privileges, possibly reading and writing local files or executing
local applications. (CVE-2006-6731)
Daniel Bleichenbacher discovered an attack on PKCS #1 v1.5 signatures.
Where an RSA key with exponent 3 is used it may be possible for an
attacker to forge a PKCS #1 v1.5 signature that would be incorrectly
verified by implementations that do not check for excess data in the
RSA exponentiation result of the signature. (CVE-2006-4339)
All users of java-1.4.2-ibm should upgrade to these updated packages,
which contain IBM's 1.4.2 SR7 Java release which resolves these
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 9.3
Family: Red Hat Local Security Checks
Nessus Plugin ID: 63837 ()
CVE ID: CVE-2006-4339CVE-2006-6731CVE-2006-6736CVE-2006-6737CVE-2006-6745
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.