RHEL 4 / 5 : IBM Java Runtime in Satellite Server (RHSA-2010:0471)

high Nessus Plugin ID 47017

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Network Satellite Server 5.3.

The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Network Satellite Server 5.3. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets.

Several flaws were fixed in the IBM Java 2 Runtime Environment.
(CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088, CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0846, CVE-2010-0848, CVE-2010-0849)

Users of Red Hat Network Satellite Server 5.3 are advised to upgrade to these updated java-1.6.0-ibm packages, which resolve these issues.
For this update to take effect, Red Hat Network Satellite Server must be restarted ('/usr/sbin/rhn-satellite restart'), as well as all running instances of IBM Java.

Solution

Update the affected java-1.6.0-ibm and / or java-1.6.0-ibm-devel packages.

See Also

https://access.redhat.com/security/cve/cve-2010-0084

https://access.redhat.com/security/cve/cve-2010-0085

https://access.redhat.com/security/cve/cve-2010-0087

https://access.redhat.com/security/cve/cve-2010-0088

https://access.redhat.com/security/cve/cve-2010-0089

https://access.redhat.com/security/cve/cve-2010-0090

https://access.redhat.com/security/cve/cve-2010-0091

https://access.redhat.com/security/cve/cve-2010-0092

https://access.redhat.com/security/cve/cve-2010-0094

https://access.redhat.com/security/cve/cve-2010-0095

https://access.redhat.com/security/cve/cve-2010-0837

https://access.redhat.com/security/cve/cve-2010-0838

https://access.redhat.com/security/cve/cve-2010-0839

https://access.redhat.com/security/cve/cve-2010-0840

https://access.redhat.com/security/cve/cve-2010-0841

https://access.redhat.com/security/cve/cve-2010-0842

https://access.redhat.com/security/cve/cve-2010-0843

https://access.redhat.com/security/cve/cve-2010-0844

https://access.redhat.com/security/cve/cve-2010-0846

https://access.redhat.com/security/cve/cve-2010-0847

https://access.redhat.com/security/cve/cve-2010-0848

https://access.redhat.com/security/cve/cve-2010-0849

https://access.redhat.com/errata/RHSA-2010:0471

Plugin Details

Severity: High

ID: 47017

File Name: redhat-RHSA-2010-0471.nasl

Version: 1.34

Type: local

Agent: unix

Published: 6/15/2010

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Critical

Score: 9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:H/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/14/2010

Vulnerability Publication Date: 4/1/2010

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Java MixerSequencer Object GM_Song Structure Handling Vulnerability)

Reference Information

CVE: CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088, CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0846, CVE-2010-0847, CVE-2010-0848, CVE-2010-0849

BID: 39062, 39065, 39067, 39068, 39069, 39070, 39072, 39073, 39075, 39077, 39078, 39081, 39083, 39084, 39086, 39090, 39091, 39093, 39094, 39095, 39096

RHSA: 2010:0471