RHEL 6 : java-1.8.0-openjdk (RHSA-2016:0651)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

An update for java-1.8.0-openjdk is now available for Red Hat
Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security
impact of Critical. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime
Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es) :

* Multiple flaws were discovered in the Serialization and Hotspot
components in OpenJDK. An untrusted Java application or applet could
use these flaws to completely bypass Java sandbox restrictions.
(CVE-2016-0686, CVE-2016-0687)

* It was discovered that the RMI server implementation in the JMX
component in OpenJDK did not restrict which classes can be
deserialized when deserializing authentication credentials. A remote,
unauthenticated attacker able to connect to a JMX port could possibly
use this flaw to trigger deserialization flaws. (CVE-2016-3427)

* It was discovered that the JAXP component in OpenJDK failed to
properly handle Unicode surrogate pairs used as part of the XML
attribute values. Specially crafted XML input could cause a Java
application to use an excessive amount of memory when parsed.
(CVE-2016-3425)

* It was discovered that the GCM (Galois/Counter Mode) implementation
in the JCE component in OpenJDK used a non-constant time comparison
when comparing GCM authentication tags. A remote attacker could
possibly use this flaw to determine the value of the authentication
tag. (CVE-2016-3426)

* It was discovered that the Security component in OpenJDK failed to
check the digest algorithm strength when generating DSA signatures.
The use of a digest weaker than the key strength could lead to the
generation of signatures that were weaker than expected.
(CVE-2016-0695)

See also :

https://www.redhat.com/security/data/cve/CVE-2016-0686.html
https://www.redhat.com/security/data/cve/CVE-2016-0687.html
https://www.redhat.com/security/data/cve/CVE-2016-0695.html
https://www.redhat.com/security/data/cve/CVE-2016-3425.html
https://www.redhat.com/security/data/cve/CVE-2016-3426.html
https://www.redhat.com/security/data/cve/CVE-2016-3427.html
http://rhn.redhat.com/errata/RHSA-2016-0651.html

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 90616 ()

Bugtraq ID:

CVE ID: CVE-2016-0686
CVE-2016-0687
CVE-2016-0695
CVE-2016-3425
CVE-2016-3426
CVE-2016-3427

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now