RHEL 5 / 6 / 7 : java-1.6.0-sun (RHSA-2015:1243) (Bar Mitzvah) (Logjam)

Critical Nessus Plugin ID 84873

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated java-1.6.0-sun packages that fix several security issues are now available for Oracle Java for Red Hat Enterprise Linux 5, 6, and 7.

Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

Oracle Java SE version 6 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.

This update fixes several vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section.
(CVE-2015-2590, CVE-2015-2601, CVE-2015-2621, CVE-2015-2625, CVE-2015-2627, CVE-2015-2628, CVE-2015-2632, CVE-2015-2637, CVE-2015-2638, CVE-2015-2664, CVE-2015-2808, CVE-2015-4000, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733, CVE-2015-4748, CVE-2015-4749, CVE-2015-4760)

Note: With this update, Oracle JDK now disables RC4 TLS/SSL cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to in the References section, for additional details about this change.

Note: This update forces the TLS/SSL client implementation in Oracle JDK to reject DH key sizes below 768 bits to address the CVE-2015-4000 issue. Refer to Red Hat Bugzilla bug 1223211, linked to in the References section, for additional details about this change.

All users of java-1.6.0-sun are advised to upgrade to these updated packages, which provide Oracle Java 6 Update 101 and resolve these issues. All running instances of Oracle Java must be restarted for the update to take effect.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?73eb3b44

https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11

https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33

https://access.redhat.com/errata/RHSA-2015:1243

https://access.redhat.com/security/cve/cve-2015-2590

https://access.redhat.com/security/cve/cve-2015-2601

https://access.redhat.com/security/cve/cve-2015-2621

https://access.redhat.com/security/cve/cve-2015-2625

https://access.redhat.com/security/cve/cve-2015-2627

https://access.redhat.com/security/cve/cve-2015-2628

https://access.redhat.com/security/cve/cve-2015-2632

https://access.redhat.com/security/cve/cve-2015-2637

https://access.redhat.com/security/cve/cve-2015-2638

https://access.redhat.com/security/cve/cve-2015-2664

https://access.redhat.com/security/cve/cve-2015-2808

https://access.redhat.com/security/cve/cve-2015-4000

https://access.redhat.com/security/cve/cve-2015-4731

https://access.redhat.com/security/cve/cve-2015-4732

https://access.redhat.com/security/cve/cve-2015-4733

https://access.redhat.com/security/cve/cve-2015-4748

https://access.redhat.com/security/cve/cve-2015-4749

https://access.redhat.com/security/cve/cve-2015-4760

Plugin Details

Severity: Critical

ID: 84873

File Name: redhat-RHSA-2015-1243.nasl

Version: 2.16

Type: local

Agent: unix

Published: 2015/07/20

Updated: 2019/10/24

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSS v3.0

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun-demo, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun-devel, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun-jdbc, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun-plugin, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun-src, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.6, cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:7.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/07/17

Reference Information

CVE: CVE-2015-2590, CVE-2015-2601, CVE-2015-2621, CVE-2015-2625, CVE-2015-2627, CVE-2015-2628, CVE-2015-2632, CVE-2015-2637, CVE-2015-2638, CVE-2015-2664, CVE-2015-2808, CVE-2015-4000, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733, CVE-2015-4748, CVE-2015-4749, CVE-2015-4760

BID: 73684, 74733, 75784, 75796, 75812, 75818, 75823, 75832, 75833, 75854, 75857, 75861, 75867, 75874, 75883, 75890, 75893, 75895

RHSA: 2015:1243