RHEL 5 / 6 : java-1.7.0-ibm and java-1.7.1-ibm (RHSA-2016:1430)

critical Nessus Plugin ID 92400

Synopsis

The remote Red Hat host is missing one or more security updates for java-1.7.0-ibm / java-1.7.1-ibm.

Description

The remote Redhat Enterprise Linux 5 / 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2016:1430 advisory.

- OpenJDK: kerberos realm name leak (JGSS, 8048030) (CVE-2015-4734)

- OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) (CVE-2015-4803)

- OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) (CVE-2015-4805)

- OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) (CVE-2015-4806)

- Oracle JDK: unspecified vulnerability fixed in 7u91 and 8u65 (Deployment) (CVE-2015-4810)

- OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) (CVE-2015-4835)

- OpenJDK: OOB access in CMS code (2D, 8086092) (CVE-2015-4840)

- OpenJDK: leak of user.dir location (JAXP, 8078427) (CVE-2015-4842)

- OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) (CVE-2015-4843)

- ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) (CVE-2015-4844)

- OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) (CVE-2015-4860)

- OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) (CVE-2015-4871)

- OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) (CVE-2015-4872)

- OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) (CVE-2015-4882)

- OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) (CVE-2015-4883)

- OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) (CVE-2015-4893)

- Oracle JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) (CVE-2015-4902)

- OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) (CVE-2015-4903)

- IBM JDK: local disclosure of kerberos credentials cache (CVE-2015-5006)

- IBM JDK: J9 JVM allows code to invoke non-public interface methods (CVE-2015-5041)

- TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) (CVE-2015-7575)

- libpng: Out-of-bounds read in png_convert_to_rfc1123 (CVE-2015-7981)

- libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (CVE-2015-8126, CVE-2015-8472)

- libpng: underflow read in png_check_keyword() (CVE-2015-8540)

- IBM JDK: buffer overflow vulnerability in the IBM JVM (CVE-2016-0264)

- IBM JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (CVE-2016-0363)

- IBM JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (CVE-2016-0376)

- OpenJDK: URL deserialization inconsistencies (Networking, 8059054) (CVE-2016-0402)

- OpenJDK: logging of RMI connection secrets (JMX, 8130710) (CVE-2016-0448)

- OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) (CVE-2016-0466)

- OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) (CVE-2016-0483)

- ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543) (CVE-2016-0494)

- OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) (CVE-2016-0686)

- OpenJDK: insufficient byte type checks (Hotspot, 8132051) (CVE-2016-0687)

- Oracle JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) (CVE-2016-3422, CVE-2016-3443)

- OpenJDK: non-constant time GCM authentication tag comparison (JCE, 8143945) (CVE-2016-3426)

- OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) (CVE-2016-3427)

- Oracle JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment) (CVE-2016-3449)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL java-1.7.0-ibm / java-1.7.1-ibm packages based on the guidance in RHSA-2016:1430.

See Also

http://www.nessus.org/u?c4314002

https://access.redhat.com/errata/RHSA-2016:1430

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=1233687

https://bugzilla.redhat.com/show_bug.cgi?id=1273022

https://bugzilla.redhat.com/show_bug.cgi?id=1273053

https://bugzilla.redhat.com/show_bug.cgi?id=1273304

https://bugzilla.redhat.com/show_bug.cgi?id=1273308

https://bugzilla.redhat.com/show_bug.cgi?id=1273311

https://bugzilla.redhat.com/show_bug.cgi?id=1273318

https://bugzilla.redhat.com/show_bug.cgi?id=1273338

https://bugzilla.redhat.com/show_bug.cgi?id=1273414

https://bugzilla.redhat.com/show_bug.cgi?id=1273425

https://bugzilla.redhat.com/show_bug.cgi?id=1273430

https://bugzilla.redhat.com/show_bug.cgi?id=1273496

https://bugzilla.redhat.com/show_bug.cgi?id=1273637

https://bugzilla.redhat.com/show_bug.cgi?id=1273638

https://bugzilla.redhat.com/show_bug.cgi?id=1273734

https://bugzilla.redhat.com/show_bug.cgi?id=1273858

https://bugzilla.redhat.com/show_bug.cgi?id=1273859

https://bugzilla.redhat.com/show_bug.cgi?id=1273860

https://bugzilla.redhat.com/show_bug.cgi?id=1276416

https://bugzilla.redhat.com/show_bug.cgi?id=1281756

https://bugzilla.redhat.com/show_bug.cgi?id=1282379

https://bugzilla.redhat.com/show_bug.cgi?id=1289841

https://bugzilla.redhat.com/show_bug.cgi?id=1291312

https://bugzilla.redhat.com/show_bug.cgi?id=1298906

https://bugzilla.redhat.com/show_bug.cgi?id=1298957

https://bugzilla.redhat.com/show_bug.cgi?id=1299073

https://bugzilla.redhat.com/show_bug.cgi?id=1299385

https://bugzilla.redhat.com/show_bug.cgi?id=1299441

https://bugzilla.redhat.com/show_bug.cgi?id=1302689

https://bugzilla.redhat.com/show_bug.cgi?id=1324044

https://bugzilla.redhat.com/show_bug.cgi?id=1327743

https://bugzilla.redhat.com/show_bug.cgi?id=1327749

https://bugzilla.redhat.com/show_bug.cgi?id=1328059

https://bugzilla.redhat.com/show_bug.cgi?id=1328210

https://bugzilla.redhat.com/show_bug.cgi?id=1328618

https://bugzilla.redhat.com/show_bug.cgi?id=1328619

https://bugzilla.redhat.com/show_bug.cgi?id=1328620

https://bugzilla.redhat.com/show_bug.cgi?id=1330986

https://bugzilla.redhat.com/show_bug.cgi?id=1331359

https://bugzilla.redhat.com/show_bug.cgi?id=1351695

https://bugzilla.redhat.com/show_bug.cgi?id=1353209

Plugin Details

Severity: Critical

ID: 92400

File Name: redhat-RHSA-2016-1430.nasl

Version: 2.18

Type: local

Agent: unix

Published: 7/19/2016

Updated: 4/21/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-3443

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Temporal Score: 8.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-ibm-devel, p-cpe:/a:redhat:enterprise_linux:java-1.7.1-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.7.1-ibm-devel, p-cpe:/a:redhat:enterprise_linux:spacewalk-java, p-cpe:/a:redhat:enterprise_linux:spacewalk-java-config, p-cpe:/a:redhat:enterprise_linux:spacewalk-java-lib, p-cpe:/a:redhat:enterprise_linux:spacewalk-java-oracle, p-cpe:/a:redhat:enterprise_linux:spacewalk-java-postgresql, p-cpe:/a:redhat:enterprise_linux:spacewalk-taskomatic, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/18/2016

Vulnerability Publication Date: 10/21/2015

CISA Known Exploited Vulnerability Due Dates: 3/24/2022, 6/2/2023

Reference Information

CVE: CVE-2015-4734, CVE-2015-4803, CVE-2015-4805, CVE-2015-4806, CVE-2015-4810, CVE-2015-4835, CVE-2015-4840, CVE-2015-4842, CVE-2015-4843, CVE-2015-4844, CVE-2015-4860, CVE-2015-4871, CVE-2015-4872, CVE-2015-4882, CVE-2015-4883, CVE-2015-4893, CVE-2015-4902, CVE-2015-4903, CVE-2015-5006, CVE-2015-5041, CVE-2015-7575, CVE-2015-7981, CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0264, CVE-2016-0363, CVE-2016-0376, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0483, CVE-2016-0494, CVE-2016-0686, CVE-2016-0687, CVE-2016-3422, CVE-2016-3426, CVE-2016-3427, CVE-2016-3443, CVE-2016-3449

CWE: 119, 120, 125, 20, 200, 407, 532, 665, 681, 770, 787

RHSA: 2016:1430