SuSE 11 Security Update : IBM Java 1.6.0 (SAT Patch Number 1497)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

The IBM Java 6 JRE/SDK was updated to Service Release 6, fixing
various bugs and security issues.

The following security issues were fixed :

- A security vulnerability in the JNLPAppletLauncher might
impact users of the Sun JDK and JRE. Non-current
versions of the JNLPAppletLauncher might be re-purposed
with an untrusted Java applet to write arbitrary files
on the system of the user downloading and running the
untrusted applet. (CVE-2009-2676)

The JNLPAppletLauncher is a general purpose JNLP-based applet launcher
class for deploying applets that use extension libraries containing
native code.

- The Java Runtime Environment includes the Java Web Start
technology that uses the Java Web Start ActiveX control
to launch Java Web Start in Internet Explorer. A
security vulnerability in the Active Template Library
(ATL) in various releases of Microsoft Visual Studio,
which is used by the Java Web Start ActiveX control,
might allow the Java Web Start ActiveX control to be
leveraged to run arbitrary code. This might occur as the
result of a user of the Java Runtime Environment viewing
a specially crafted web page that exploits this
vulnerability. (CVE-2009-2493)

- A vulnerability in the Java Runtime Environment audio
system might allow an untrusted applet or Java Web Start
application to access system properties. (CVE-2009-2670)

- A vulnerability with verifying HMAC-based XML digital
signatures in the XML Digital Signature implementation
included with the Java Runtime Environment (JRE) might
allow authentication to be bypassed. Applications that
validate HMAC-based XML digital signatures might be
vulnerable to this type of attack. (CVE-2009-0217)

Note: This vulnerability cannot be exploited by an untrusted applet or
Java Web Start application.

- A vulnerability in the Java Runtime Environment with the
SOCKS proxy implementation might allow an untrusted
applet or Java Web Start application to determine the
username of the user running the applet or application.
(CVE-2009-2671 / CVE-2009-2672)

A second vulnerability in the Java Runtime Environment with the proxy
mechanism implementation might allow an untrusted applet or Java Web
Start application to obtain browser cookies and leverage those cookies
to hijack sessions.

- A vulnerability in the Java Runtime Environment with the
proxy mechanism implementation might allow an untrusted
applet or Java Web Start application to make
non-authorized socket or URL connections to hosts other
than the origin host. (CVE-2009-2673)

- An integer overflow vulnerability in the Java Runtime
Environment with processing JPEG images might allow an
untrusted Java Web Start application to escalate
privileges. For example, an untrusted application might
grant itself permissions to read and write local files
or run local applications that are accessible to the
user running the untrusted applet. (CVE-2009-2674)

- An integer overflow vulnerability in the Java Runtime
Environment with unpacking applets and Java Web Start
applications using the unpack200 JAR unpacking utility
might allow an untrusted applet or application to
escalate privileges. For example, an untrusted applet
might grant itself permissions to read and write local
files or run local applications that are accessible to
the user running the untrusted applet. (CVE-2009-2675)

- A vulnerability in the Java Runtime Environment (JRE)
with parsing XML data might allow a remote client to
create a denial-of-service condition on the system that
the JRE runs on. (CVE-2009-2625)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=548655
http://support.novell.com/security/cve/CVE-2009-0217.html
http://support.novell.com/security/cve/CVE-2009-2493.html
http://support.novell.com/security/cve/CVE-2009-2625.html
http://support.novell.com/security/cve/CVE-2009-2670.html
http://support.novell.com/security/cve/CVE-2009-2671.html
http://support.novell.com/security/cve/CVE-2009-2672.html
http://support.novell.com/security/cve/CVE-2009-2673.html
http://support.novell.com/security/cve/CVE-2009-2674.html
http://support.novell.com/security/cve/CVE-2009-2675.html
http://support.novell.com/security/cve/CVE-2009-2676.html

Solution :

Apply SAT patch number 1497.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now