RHEL 5 : IBM Java Runtime (RHSA-2011:0880)

Critical Nessus Plugin ID 63983

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Network Satellite 5.4.1 for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Network Satellite 5.4.1. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets.

This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment. Detailed vulnerability descriptions are linked from the IBM 'Security alerts' page, listed in the References section.
(CVE-2009-3555, CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557, CVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574, CVE-2010-4422, CVE-2010-4447, CVE-2010-4448, CVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463, CVE-2010-4465, CVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4471, CVE-2010-4473, CVE-2010-4475, CVE-2010-4476)

Users of Red Hat Network Satellite 5.4.1 are advised to upgrade to these updated java-1.6.0-ibm packages, which contain the IBM 1.6.0 SR9-FP1 Java release. For this update to take effect, Red Hat Network Satellite must be restarted. Refer to the Solution section for details.

Solution

Update the affected java-1.6.0-ibm and / or java-1.6.0-ibm-devel packages.

See Also

https://www.redhat.com/security/data/cve/CVE-2009-3555.html

https://www.redhat.com/security/data/cve/CVE-2010-1321.html

https://www.redhat.com/security/data/cve/CVE-2010-3541.html

https://www.redhat.com/security/data/cve/CVE-2010-3548.html

https://www.redhat.com/security/data/cve/CVE-2010-3549.html

https://www.redhat.com/security/data/cve/CVE-2010-3550.html

https://www.redhat.com/security/data/cve/CVE-2010-3551.html

https://www.redhat.com/security/data/cve/CVE-2010-3553.html

https://www.redhat.com/security/data/cve/CVE-2010-3555.html

https://www.redhat.com/security/data/cve/CVE-2010-3556.html

https://www.redhat.com/security/data/cve/CVE-2010-3557.html

https://www.redhat.com/security/data/cve/CVE-2010-3558.html

https://www.redhat.com/security/data/cve/CVE-2010-3560.html

https://www.redhat.com/security/data/cve/CVE-2010-3562.html

https://www.redhat.com/security/data/cve/CVE-2010-3563.html

https://www.redhat.com/security/data/cve/CVE-2010-3565.html

https://www.redhat.com/security/data/cve/CVE-2010-3566.html

https://www.redhat.com/security/data/cve/CVE-2010-3568.html

https://www.redhat.com/security/data/cve/CVE-2010-3569.html

https://www.redhat.com/security/data/cve/CVE-2010-3571.html

https://www.redhat.com/security/data/cve/CVE-2010-3572.html

https://www.redhat.com/security/data/cve/CVE-2010-3573.html

https://www.redhat.com/security/data/cve/CVE-2010-3574.html

https://www.redhat.com/security/data/cve/CVE-2010-4422.html

https://www.redhat.com/security/data/cve/CVE-2010-4447.html

https://www.redhat.com/security/data/cve/CVE-2010-4448.html

https://www.redhat.com/security/data/cve/CVE-2010-4452.html

https://www.redhat.com/security/data/cve/CVE-2010-4454.html

https://www.redhat.com/security/data/cve/CVE-2010-4462.html

https://www.redhat.com/security/data/cve/CVE-2010-4463.html

https://www.redhat.com/security/data/cve/CVE-2010-4465.html

https://www.redhat.com/security/data/cve/CVE-2010-4466.html

https://www.redhat.com/security/data/cve/CVE-2010-4467.html

https://www.redhat.com/security/data/cve/CVE-2010-4468.html

https://www.redhat.com/security/data/cve/CVE-2010-4471.html

https://www.redhat.com/security/data/cve/CVE-2010-4473.html

https://www.redhat.com/security/data/cve/CVE-2010-4475.html

https://www.redhat.com/security/data/cve/CVE-2010-4476.html

http://www.ibm.com/developerworks/java/jdk/alerts/

http://rhn.redhat.com/errata/RHSA-2011-0880.html

Plugin Details

Severity: Critical

ID: 63983

File Name: redhat-RHSA-2011-0880.nasl

Version: 1.11

Type: local

Agent: unix

Published: 2013/01/24

Updated: 2018/07/25

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel, cpe:/o:redhat:enterprise_linux:5

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/06/16

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Sun Java Applet2ClassLoader Remote Code Execution)

Reference Information

CVE: CVE-2009-3555, CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557, CVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574, CVE-2010-4422, CVE-2010-4447, CVE-2010-4448, CVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463, CVE-2010-4465, CVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4471, CVE-2010-4473, CVE-2010-4475, CVE-2010-4476

BID: 43965, 43971, 43979, 43985, 43988, 43999, 44009, 44011, 44012, 44014, 44016, 44017, 44021, 44024, 44027, 44028, 44030, 44032, 44035, 44038, 44040, 46091, 46386, 46388, 46391, 46393, 46394, 46395, 46398, 46399, 46402, 46403, 46406, 46409, 46410, 46411

RHSA: 2011:0880

CWE: 310