Executive Summary
Summary | |
---|---|
Title | java-1.5.0-ibm security update |
Informations | |||
---|---|---|---|
Name | RHSA-2007:0829 | First vendor Publication | 2007-08-07 |
Vendor | RedHat | Last vendor Modification | 2007-08-07 |
Severity (Vendor) | Critical | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated java-1.5.0-ibm packages that correct several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 Extras - i386, ppc, s390, s390x, x86_64 Red Hat Desktop version 4 Extras - i386, x86_64 Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64 Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64 RHEL Desktop Supplementary (v. 5 client) - i386, x86_64 RHEL Supplementary (v. 5 server) - i386, ppc, s390x, x86_64 3. Problem description: IBM's 1.5.0 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. A security vulnerability in the Java Web Start component was discovered. An untrusted application could elevate it's privileges, allowing it to read and write local files that are accessible to the user running the Java Web Start application. (CVE-2007-2435) A buffer overflow in the Java Runtime Environment image handling code was found. An untrusted applet or application could use this flaw to elevate its privileges and potentially execute arbitrary code as the user running the java virtual machine. (CVE-2007-2788, CVE-2007-2789, CVE-2007-3004) An unspecified vulnerability was discovered in the Java Runtime Environment. An untrusted applet or application could cause the java virtual machine to become unresponsive. (CVE-2007-3005) The Javadoc tool was able to generate HTML documentation pages that contained cross-site scripting (XSS) vulnerabilities. A remote attacker could use this to inject arbitrary web script or HTML. (CVE-2007-3503) The Java Web Start URL parsing component contains a buffer overflow vulnerability within the parsing code for JNLP files. A remote attacker could create a malicious JNLP file that could trigger this flaw and execute arbitrary code when opened. (CVE-2007-3655) A flaw was found in the applet class loader. An untrusted applet could use this flaw to circumvent network access restrictions, possibly connecting to services hosted on the machine that executed the applet. (CVE-2007-3922) All users of java-ibm-1.5.0 should upgrade to these updated packages, which contain IBM's 1.5.0 SR5a Java release that resolves these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 239660 - CVE-2007-2435 javaws vulnerabilities 242595 - CVE-2007-3004 Integer overflow in IBM JDK's ICC profile parser 246765 - CVE-2007-3503 HTML files generated with Javadoc are vulnerable to a XSS 248864 - CVE-2007-3655 A buffer overflow vulnerability in Java Web Start URL parsing code 249533 - CVE-2007-3922 Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions 250725 - CVE-2007-2788 Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit 250729 - CVE-2007-2789 BMP image parser vulnerability 250733 - CVE-2007-3005 Unspecified vulnerability in Sun JRE |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2007-0829.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
17 % | CWE-399 | Resource Management Errors |
17 % | CWE-264 | Permissions, Privileges, and Access Controls |
17 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
17 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:21711 | |||
Oval ID: | oval:org.mitre.oval:def:21711 | ||
Title: | ELSA-2007:0817: java-1.4.2-ibm security update (Critical) | ||
Description: | The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0817-01 CVE-2007-2435 CVE-2007-2788 CVE-2007-2789 | Version: | 17 |
Platform(s): | Oracle Linux 5 | Product(s): | java-1.4.2-ibm |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for Java 2 File : nvt/sles9p5015291.nasl |
2009-10-10 | Name : SLES9: Security update for IBM Java2 JRE and SDK File : nvt/sles9p5015890.nasl |
2009-06-05 | Name : Ubuntu USN-723-1 (git-core) File : nvt/ubuntu_723_1.nasl |
2009-03-06 | Name : RedHat Update for IBMJava2 RHSA-2008:0133-01 File : nvt/gb_RHSA-2008_0133-01_IBMJava2.nasl |
2009-01-28 | Name : SuSE Update for IBM Java, Sun Java SUSE-SA:2007:045 File : nvt/gb_suse_2007_045.nasl |
2009-01-28 | Name : SuSE Update for IBM Java SUSE-SA:2007:056 File : nvt/gb_suse_2007_056.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200705-23 (sun-jdk,sun-jre-bin) File : nvt/glsa_200705_23.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200706-08 (emul-linux-x86-java) File : nvt/glsa_200706_08.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200709-15 (jrockit-jdk-bin) File : nvt/glsa_200709_15.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200804-20 (sun-jdk, sun-jre-bin, emul-linux-x86... File : nvt/glsa_200804_20.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200804-28 (jrockit-jdk-bin) File : nvt/glsa_200804_28.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200806-11 (ibm-jdk-bin ibm-jre-bin) File : nvt/glsa_200806_11.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2007-243-01 java (jre, jdk) File : nvt/esoft_slk_ssa_2007_243_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
37756 | Sun Java Web Start javaws.exe JNLP File Processing codebase Attribute Overflow |
36662 | Sun JDK / JDE Applet Class Loader Outbound Connection Bypass |
36488 | Sun Java JDK JavaDoc HTML Documentation Page XSS |
36202 | Sun Java JDK / JRE Unspecified Remote DoS |
36201 | Sun Java Runtime Environment Image Parsing Overflow |
36200 | Sun Java JDK BMP Parsing Remote Privilege Escalation |
36199 | Sun Java JDK Embedded ICC Profile Image Parser Overflow |
35483 | Sun Java Web Start JNLP File Unspecified Privilege Escalation |
Snort® IPS/IDS
Date | Description |
---|---|
2015-03-31 | Oracle Java WebStart JNLP stack buffer overflow attempt RuleID : 33588 - Revision : 2 - Type : FILE-OTHER |
2014-01-10 | Oracle JDK image parsing library ICC buffer overflow attempt RuleID : 17727 - Revision : 14 - Type : FILE-OTHER |
2014-01-10 | Sun JDK image parsing library ICC buffer overflow attempt RuleID : 15328 - Revision : 6 - Type : FILE-JAVA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-02-22 | Name : The remote Unix host has an application that may be prone to a buffer overflo... File : sun_java_webstart_jnlp_overflow_unix.nasl - Type : ACT_GATHER_INFO |
2013-02-22 | Name : The remote Unix host has an application that is affected by several vulnerabi... File : sun_java_jre_102934_unix.nasl - Type : ACT_GATHER_INFO |
2013-02-22 | Name : The remote Unix host has an application that is affected by a privilege escal... File : sun_java_jre_102881_unix.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-1086.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0818.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20080114_jdk__java__on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071128_jdk__java__on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2010-01-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0524.nasl - Type : ACT_GATHER_INFO |
2010-01-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0261.nasl - Type : ACT_GATHER_INFO |
2009-08-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0100.nasl - Type : ACT_GATHER_INFO |
2009-08-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0956.nasl - Type : ACT_GATHER_INFO |
2009-08-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0829.nasl - Type : ACT_GATHER_INFO |
2009-08-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0817.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESX host is missing a security-related patch. File : vmware_VMSA-2008-0002.nasl - Type : ACT_GATHER_INFO |
2009-06-15 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_38148.nasl - Type : ACT_GATHER_INFO |
2009-06-15 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_38147.nasl - Type : ACT_GATHER_INFO |
2008-11-25 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_38761.nasl - Type : ACT_GATHER_INFO |
2008-06-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0133.nasl - Type : ACT_GATHER_INFO |
2008-04-22 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200804-20.nasl - Type : ACT_GATHER_INFO |
2007-12-17 | Name : The remote host is affected by multiple vulnerabilities. File : macosx_java_rel6.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_5_0-ibm-4544.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_4_2-sun-3844.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_4_2-ibm-4542.nasl - Type : ACT_GATHER_INFO |
2007-11-20 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_37197.nasl - Type : ACT_GATHER_INFO |
2007-11-20 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_37183.nasl - Type : ACT_GATHER_INFO |
2007-11-20 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_37182.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_java-1_5_0-sun-3832.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_java-1_4_2-sun-3843.nasl - Type : ACT_GATHER_INFO |
2007-09-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200709-15.nasl - Type : ACT_GATHER_INFO |
2007-09-03 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2007-243-01.nasl - Type : ACT_GATHER_INFO |
2007-07-10 | Name : The remote Windows host has an application that may be prone to a buffer over... File : sun_java_webstart_jnlp_overflow.nasl - Type : ACT_GATHER_INFO |
2007-06-27 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200706-08.nasl - Type : ACT_GATHER_INFO |
2007-06-04 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200705-23.nasl - Type : ACT_GATHER_INFO |
2007-06-02 | Name : The remote Windows host has an application that is affected by several vulner... File : sun_java_jre_102934.nasl - Type : ACT_GATHER_INFO |
2007-05-02 | Name : The remote Windows host has an application that is affected by a privilege es... File : sun_java_jre_102881.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:50:58 |
|