Scientific Linux Security Update : java-1.7.0-openjdk on SL5.x, SL7.x i386/x86_64

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

Security Fix(es) :

- Multiple flaws were discovered in the Serialization and
Hotspot components in OpenJDK. An untrusted Java
application or applet could use these flaws to
completely bypass Java sandbox restrictions.
(CVE-2016-0686, CVE-2016-0687)

- It was discovered that the RMI server implementation in
the JMX component in OpenJDK did not restrict which
classes can be deserialized when deserializing
authentication credentials. A remote, unauthenticated
attacker able to connect to a JMX port could possibly
use this flaw to trigger deserialization flaws.

- It was discovered that the JAXP component in OpenJDK
failed to properly handle Unicode surrogate pairs used
as part of the XML attribute values. Specially crafted
XML input could cause a Java application to use an
excessive amount of memory when parsed. (CVE-2016-3425)

- It was discovered that the Security component in OpenJDK
failed to check the digest algorithm strength when
generating DSA signatures. The use of a digest weaker
than the key strength could lead to the generation of
signatures that were weaker than expected.

See also :

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 90673 ()

Bugtraq ID:

CVE ID: CVE-2016-0686

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now