RHEL 5 / 6 : Red Hat Satellite IBM Java Runtime (RHSA-2015:0264)

low Nessus Plugin ID 81505

Synopsis

The remote Red Hat host is missing one or more security updates for Red Hat Satellite IBM Java Runtime.

Description

The remote Redhat Enterprise Linux 5 / 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2015:0264 advisory.

- IBM JDK: privilege escalation via shared class cache (CVE-2014-3065)

- IBM JDK: Java CMS keystore provider potentially allows brute-force private key recovery (CVE-2014-3068)

- IBM JDK: Privilege escalation issue (CVE-2014-3086)

- SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack (CVE-2014-3566)

- OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) (CVE-2014-4209)

- OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) (CVE-2014-4218)

- OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) (CVE-2014-4219)

- Oracle JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) (CVE-2014-4227, CVE-2014-4265)

- OpenJDK: RSA blinding issues (Security, 8031346) (CVE-2014-4244)

- OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) (CVE-2014-4252)

- OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) (CVE-2014-4262)

- OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) (CVE-2014-4263)

- Oracle JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) (CVE-2014-4288, CVE-2014-6458, CVE-2014-6492, CVE-2014-6493, CVE-2014-6503, CVE-2014-6515, CVE-2014-6532)

- OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) (CVE-2014-6457)

- OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) (CVE-2014-6502)

- OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) (CVE-2014-6506)

- ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) (CVE-2014-6511)

- OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) (CVE-2014-6512)

- OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) (CVE-2014-6531)

- OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846) (CVE-2014-6558)

- ICU: font parsing OOB read (OpenJDK 2D, 8055489) (CVE-2014-6585)

- OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) (CVE-2014-6587)

- ICU: font parsing OOB read (OpenJDK 2D, 8056276) (CVE-2014-6591)

- OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) (CVE-2014-6593)

- IBM JDK: unspecified full Java sandbox bypass fixed in Feb 2015 update (CVE-2014-8891)

- IBM JDK: unspecified partial Java sandbox bypass fixed in Feb 2015 update (CVE-2014-8892)

- OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125) (CVE-2015-0395)

- Oracle JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) (CVE-2015-0403, CVE-2015-0406)

- OpenJDK: directory information leak via file chooser (Swing, 8055304) (CVE-2015-0407)

- OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) (CVE-2015-0408)

- OpenJDK: DER decoder infinite loop (Security, 8059485) (CVE-2015-0410)

- OpenJDK: insufficient code privileges checks (JAX-WS, 8054367) (CVE-2015-0412)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL Red Hat Satellite IBM Java Runtime package based on the guidance in RHSA-2015:0264.

See Also

http://www.nessus.org/u?542d986c

https://www.ibm.com/developerworks/java/jdk/alerts/

https://access.redhat.com/errata/RHSA-2015:0264

https://access.redhat.com/security/updates/classification/#low

https://bugzilla.redhat.com/show_bug.cgi?id=1071210

https://bugzilla.redhat.com/show_bug.cgi?id=1075795

https://bugzilla.redhat.com/show_bug.cgi?id=1119475

https://bugzilla.redhat.com/show_bug.cgi?id=1119476

https://bugzilla.redhat.com/show_bug.cgi?id=1119596

https://bugzilla.redhat.com/show_bug.cgi?id=1119608

https://bugzilla.redhat.com/show_bug.cgi?id=1119611

https://bugzilla.redhat.com/show_bug.cgi?id=1119613

https://bugzilla.redhat.com/show_bug.cgi?id=1119912

https://bugzilla.redhat.com/show_bug.cgi?id=1119913

https://bugzilla.redhat.com/show_bug.cgi?id=1150155

https://bugzilla.redhat.com/show_bug.cgi?id=1150651

https://bugzilla.redhat.com/show_bug.cgi?id=1150669

https://bugzilla.redhat.com/show_bug.cgi?id=1151046

https://bugzilla.redhat.com/show_bug.cgi?id=1151063

https://bugzilla.redhat.com/show_bug.cgi?id=1151517

https://bugzilla.redhat.com/show_bug.cgi?id=1152756

https://bugzilla.redhat.com/show_bug.cgi?id=1152757

https://bugzilla.redhat.com/show_bug.cgi?id=1152759

https://bugzilla.redhat.com/show_bug.cgi?id=1152760

https://bugzilla.redhat.com/show_bug.cgi?id=1152761

https://bugzilla.redhat.com/show_bug.cgi?id=1152763

https://bugzilla.redhat.com/show_bug.cgi?id=1152766

https://bugzilla.redhat.com/show_bug.cgi?id=1152789

https://bugzilla.redhat.com/show_bug.cgi?id=1162554

https://bugzilla.redhat.com/show_bug.cgi?id=1164201

https://bugzilla.redhat.com/show_bug.cgi?id=1183021

https://bugzilla.redhat.com/show_bug.cgi?id=1183023

https://bugzilla.redhat.com/show_bug.cgi?id=1183031

https://bugzilla.redhat.com/show_bug.cgi?id=1183043

https://bugzilla.redhat.com/show_bug.cgi?id=1183044

https://bugzilla.redhat.com/show_bug.cgi?id=1183049

https://bugzilla.redhat.com/show_bug.cgi?id=1183645

https://bugzilla.redhat.com/show_bug.cgi?id=1183646

https://bugzilla.redhat.com/show_bug.cgi?id=1183715

https://bugzilla.redhat.com/show_bug.cgi?id=1184275

https://bugzilla.redhat.com/show_bug.cgi?id=1184277

https://bugzilla.redhat.com/show_bug.cgi?id=1189142

https://bugzilla.redhat.com/show_bug.cgi?id=1189145

Plugin Details

Severity: Low

ID: 81505

File Name: redhat-RHSA-2015-0264.nasl

Version: 1.28

Type: local

Agent: unix

Published: 2/25/2015

Updated: 4/24/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-0408

CVSS v3

Risk Factor: Low

Base Score: 3.4

Temporal Score: 3.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2014-3566

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/24/2015

Vulnerability Publication Date: 7/17/2014

Reference Information

CVE: CVE-2014-3065, CVE-2014-3068, CVE-2014-3086, CVE-2014-3566, CVE-2014-4209, CVE-2014-4218, CVE-2014-4219, CVE-2014-4227, CVE-2014-4244, CVE-2014-4252, CVE-2014-4262, CVE-2014-4263, CVE-2014-4265, CVE-2014-4288, CVE-2014-6457, CVE-2014-6458, CVE-2014-6492, CVE-2014-6493, CVE-2014-6502, CVE-2014-6503, CVE-2014-6506, CVE-2014-6511, CVE-2014-6512, CVE-2014-6515, CVE-2014-6531, CVE-2014-6532, CVE-2014-6558, CVE-2014-6585, CVE-2014-6587, CVE-2014-6591, CVE-2014-6593, CVE-2014-8891, CVE-2014-8892, CVE-2015-0395, CVE-2015-0403, CVE-2015-0406, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410, CVE-2015-0412

BID: 73258, 73259

CWE: 125, 266, 345, 476, 757, 835

RHSA: 2015:0264