SuSE 11 Security Update : Sun Java 1.6.0 (SAT Patch Number 1163)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

The Sun Java JRE /JDK 6 was updated to Update 15 fixing various
security issues.

- The audio system in Sun Java Runtime Environment (JRE)
in JDK and JRE 6 before Update 15, and JDK and JRE 5.0
before Update 20, does not prevent access to
java.lang.System properties by (1) untrusted applets and
(2) Java Web Start applications, which allows
context-dependent attackers to obtain sensitive
information by reading these properties. (CVE-2009-2670)

- The SOCKS proxy implementation in Sun Java Runtime
Environment (JRE) in JDK and JRE 6 before Update 15, and
JDK and JRE 5.0 before Update 20, allows remote
attackers to discover the username of the account that
invoked an untrusted (1) applet or (2) Java Web Start
application via unspecified vectors. (CVE-2009-2671)

- The proxy mechanism implementation in Sun Java Runtime
Environment (JRE) in JDK and JRE 6 before Update 15, and
JDK and JRE 5.0 before Update 20, does not prevent
access to browser cookies by untrusted (1) applets and
(2) Java Web Start applications, which allows remote
attackers to hijack web sessions via unspecified
vectors. (CVE-2009-2672)

- The proxy mechanism implementation in Sun Java Runtime
Environment (JRE) in JDK and JRE 6 before Update 15, and
JDK and JRE 5.0 before Update 20, allows remote
attackers to bypass intended access restrictions and
connect to arbitrary sites via unspecified vectors,
related to a declaration that lacks the final keyword.
(CVE-2009-2673)

- Integer overflow in Sun Java Runtime Environment (JRE)
in JDK and JRE 6 before Update 15 allows
context-dependent attackers to gain privileges via
vectors involving an untrusted Java Web Start
application that grants permissions to itself, related
to parsing of JPEG images. (CVE-2009-2674)

- Integer overflow in the unpack200 utility in Sun Java
Runtime Environment (JRE) in JDK and JRE 6 before Update
15, and JDK and JRE 5.0 before Update 20, allows
context-dependent attackers to gain privileges via
vectors involving an untrusted (1) applet or (2) Java
Web Start application that grants permissions to itself,
related to decompression. (CVE-2009-2675)

- Unspecified vulnerability in JNLPAppletlauncher in Sun
Java SE, and SE for Business, in JDK and JRE 6 Update 14
and earlier +and JDK and JRE 5.0 Update 19 and earlier;
and Java SE for Business in SDK and JRE 1.4.2_21 and
earlier; allows remote attackers to create or modify
arbitrary files via vectors involving an untrusted Java
applet. (CVE-2009-2676)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=492912
https://bugzilla.novell.com/show_bug.cgi?id=494536
https://bugzilla.novell.com/show_bug.cgi?id=496489
https://bugzilla.novell.com/show_bug.cgi?id=510016
https://bugzilla.novell.com/show_bug.cgi?id=528268
http://support.novell.com/security/cve/CVE-2009-2670.html
http://support.novell.com/security/cve/CVE-2009-2671.html
http://support.novell.com/security/cve/CVE-2009-2672.html
http://support.novell.com/security/cve/CVE-2009-2673.html
http://support.novell.com/security/cve/CVE-2009-2674.html
http://support.novell.com/security/cve/CVE-2009-2675.html
http://support.novell.com/security/cve/CVE-2009-2676.html

Solution :

Apply SAT patch number 1163.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 41408 ()

Bugtraq ID:

CVE ID: CVE-2009-2670
CVE-2009-2671
CVE-2009-2672
CVE-2009-2673
CVE-2009-2674
CVE-2009-2675
CVE-2009-2676

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now