SuSE 10 Security Update : IBM Java 1.5.0 (ZYPP Patch Number 5183)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 10 host is missing a security-related patch.

Description :

IBM Java 5 was updated to SR7 to fix various security issues :

- A buffer overflow vulnerability in Java Web Start may
allow an untrusted Java Web Start application that is
downloaded from a website to elevate its privileges. For
example, an untrusted Java Web Start application may
grant itself permissions to read and write local files
or execute local applications that are accessible to the
user running the untrusted application. (CVE-2008-1196)

- A vulnerability in the Java Runtime Environment may
allow JavaScript(TM) code that is downloaded by a
browser to make connections to network services on the
system that the browser runs on, through Java APIs, This
may allow files (that are accessible through these
network services) or vulnerabilities (that exist on
these network services) which are not otherwise normally
accessible to be accessed or exploited. (CVE-2008-1195)

- Two buffer overflow vulnerabilities may allow an
untrusted applet or application to cause the Java
Runtime Environment to crash. (CVE-2008-1194)

- A buffer overflow vulnerability in the Java Runtime
Environment image parsing code may allow an untrusted
applet or application to create a denial-of-service
condition, by causing the Java Runtime Environment to
crash. (CVE-2008-1194)

- A buffer overflow vulnerability in the Java Runtime
Environment image parsing code allow an untrusted applet
or application to elevate its privileges. For example,
an application may grant itself permissions to read and
write local files or execute local applications that are
accessible to the user running the untrusted
application. (CVE-2008-1193)

- A vulnerability in the Java Plug-in may an untrusted
applet to bypass same origin policy and leverage this
flaw to execute local applications that are accessible
to the user running the untrusted applet.
(CVE-2008-1192)

- A vulnerability in Java Web Start may allow an untrusted
Java Web Start application to elevate its privileges.
For example, an application may grant itself permissions
to read and write local files or execute local
applications that are accessible to the user running the
untrusted application. (CVE-2008-1190)

- A buffer overflow vulnerability in the Java Runtime
Environment may allow an untrusted applet or application
to elevate its privileges. For example, an applet may
grant itself permissions to read and write local files
or execute local applications that are accessible to the
user running the untrusted applet. (CVE-2008-1189)

- Two buffer overflow vulnerabilities in Java Web Start
may independently allow an untrusted Java Web Start
application to elevate its privileges. For example, an
untrusted Java Web Start application may grant itself
permissions to read and write local files or execute
local applications that are accessible to the user
running the untrusted application. (CVE-2008-1188)

- A vulnerability in the Java Runtime Environment with
parsing XML data may allow an untrusted applet or
application to elevate its privileges. For example, an
applet may read certain URL resources (such as some
files and web pages). (CVE-2008-1187)

- A vulnerability in the Java Runtime Environment may
allow an untrusted application or applet that is
downloaded from a website to elevate its privileges. For
example, the application or applet may grant itself
permissions to read and write local files or execute
local applications that are accessible to the user
running the untrusted application or applet.
(CVE-2008-0657)

- A vulnerability in the Java Runtime Environment (JRE)
with applet caching may allow an untrusted applet that
is downloaded from a malicious website to make network
connections to network services on machines other than
the one that the applet was downloaded from. This may
allow network resources (such as web pages) and
vulnerabilities (that exist on these network services)
which are not otherwise normally accessible to be
accessed or exploited. (CVE-2007-5232)

- A vulnerability in the Java Runtime Environment (JRE)
may allow malicious JavaScript code that is downloaded
by a browser from a malicious website to make network
connections, through Java APIs, to network services on
machines other than the one that the JavaScript code was
downloaded from. This may allow network resources (such
as web pages) and vulnerabilities (that exist on these
network services) which are not otherwise normally
accessible to be accessed or exploited. (CVE-2007-5274)

- A second vulnerability in the JRE may allow an untrusted
applet that is downloaded from a malicious website
through a web proxy to make network connections to
network services on machines other than the one that the
applet was downloaded from. This may allow network
resources (such as web pages) and vulnerabilities (that
exist on these network services) which are not otherwise
normally accessible to be accessed or exploited.
(CVE-2007-5273)

- An untrusted Java Web Start application may write
arbitrary files with the privileges of the user running
the application. (CVE-2007-5236)

- Three separate vulnerabilities may allow an untrusted
Java Web Start application to determine the location of
the Java Web Start cache. (CVE-2007-5238)

- An untrusted Java Web Start application or Java applet
may move or copy arbitrary files by requesting the user
of the application or applet to drag and drop a file
from the Java Web Start application or Java applet
window. (CVE-2007-5239)

- An untrusted applet may display an over-sized window so
that the applet warning banner is not visible to the
user running the untrusted applet. (CVE-2007-5240)

- A vulnerability in the font parsing code in the Java
Runtime Environment may allow an untrusted applet to
elevate its privileges. For example, an applet may grant
itself permissions to read and write local files or
execute local applications that are accessible to the
user running the untrusted applet. (CVE-2007-4381)

See also :

http://support.novell.com/security/cve/CVE-2007-4381.html
http://support.novell.com/security/cve/CVE-2007-5232.html
http://support.novell.com/security/cve/CVE-2007-5236.html
http://support.novell.com/security/cve/CVE-2007-5238.html
http://support.novell.com/security/cve/CVE-2007-5239.html
http://support.novell.com/security/cve/CVE-2007-5240.html
http://support.novell.com/security/cve/CVE-2007-5273.html
http://support.novell.com/security/cve/CVE-2007-5274.html
http://support.novell.com/security/cve/CVE-2008-0657.html
http://support.novell.com/security/cve/CVE-2008-1187.html
http://support.novell.com/security/cve/CVE-2008-1188.html
http://support.novell.com/security/cve/CVE-2008-1189.html
http://support.novell.com/security/cve/CVE-2008-1190.html
http://support.novell.com/security/cve/CVE-2008-1192.html
http://support.novell.com/security/cve/CVE-2008-1193.html
http://support.novell.com/security/cve/CVE-2008-1194.html
http://support.novell.com/security/cve/CVE-2008-1195.html
http://support.novell.com/security/cve/CVE-2008-1196.html

Solution :

Apply ZYPP patch number 5183.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now