RHEL 4 / 5 : java-1.5.0-ibm (RHSA-2008:0790)

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated java-1.5.0-ibm packages that fix several security issues are
now available for Red Hat Enterprise Linux 4 Extras and 5

This update has been rated as having critical security impact by the
Red Hat Security Response Team.

The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment
and the IBM Java 2 Software Development Kit.

Multiple vulnerabilities with unsigned applets were reported. A remote
attacker could misuse an unsigned applet to connect to localhost
services running on the host running the applet. (CVE-2008-3104)

A vulnerability in the XML processing API was found. A remote attacker
who caused malicious XML to be processed by an untrusted applet or
application was able to elevate permissions to access URLs on a remote
host. (CVE-2008-3106)

A buffer overflow vulnerability was found in the font processing code.
This allowed remote attackers to extend the permissions of an
untrusted applet or application, allowing it to read and/or write
local files, as well as to execute local applications accessible to
the user running the untrusted application. (CVE-2008-3108)

Several buffer overflow vulnerabilities in Java Web Start were
reported. These vulnerabilities allowed an untrusted Java Web Start
application to elevate its privileges, allowing it to read and/or
write local files, as well as to execute local applications accessible
to the user running the untrusted application. (CVE-2008-3111)

Two file processing vulnerabilities in Java Web Start were found. A
remote attacker, by means of an untrusted Java Web Start application,
was able to create or delete arbitrary files with the permissions of
the user running the untrusted application. (CVE-2008-3112,

A vulnerability in Java Web Start when processing untrusted
applications was reported. An attacker was able to acquire sensitive
information, such as the cache location. (CVE-2008-3114)

All users of java-1.5.0-ibm are advised to upgrade to these updated
packages, that contain the IBM 1.5.0 SR8 Java release, which resolves
these issues.

See also :


Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.8
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 40725 ()

Bugtraq ID: 30140

CVE ID: CVE-2008-3104

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now