Synopsis
The remote SuSE 9 host is missing a security-related patch.
Description
IBM Java 1.4.2 was updated to SR10 to fix various security issues :
  - A buffer overflow vulnerability in Java Web Start may     allow an untrusted Java Web Start application that is     downloaded from a website to elevate its privileges. For     example, an untrusted Java Web Start application may     grant itself permissions to read and write local files     or execute local applications that are accessible to the     user running the untrusted application. (CVE-2008-1196)
  - A vulnerability in the Java Runtime Environment may     allow JavaScript(TM) code that is downloaded by a     browser to make connections to network services on the     system that the browser runs on, through Java APIs, This     may allow files (that are accessible through these     network services) or vulnerabilities (that exist on     these network services) which are not otherwise normally     accessible to be accessed or exploited. (CVE-2008-1195)
  - A vulnerability in the Java Plug-in may an untrusted     applet to bypass same origin policy and leverage this     flaw to execute local applications that are accessible     to the user running the untrusted applet.
    (CVE-2008-1192)
  - A vulnerability in Java Web Start may allow an untrusted     Java Web Start application to elevate its privileges.
    For example, an application may grant itself permissions     to read and write local files or execute local     applications that are accessible to the user running the     untrusted application. (CVE-2008-1190)
  - A buffer overflow vulnerability in the Java Runtime     Environment may allow an untrusted applet or application     to elevate its privileges. For example, an applet may     grant itself permissions to read and write local files     or execute local applications that are accessible to the     user running the untrusted applet. (CVE-2008-1189)
  - A vulnerability in the Java Runtime Environment with     parsing XML data may allow an untrusted applet or     application to elevate its privileges. For example, an     applet may read certain URL resources (such as some     files and web pages). (CVE-2008-1187)
  - A vulnerability in the Java Runtime Environment (JRE)     with applet caching may allow an untrusted applet that     is downloaded from a malicious website to make network     connections to network services on machines other than     the one that the applet was downloaded from. This may     allow network resources (such as web pages) and     vulnerabilities (that exist on these network services)     which are not otherwise normally accessible to be     accessed or exploited. (CVE-2007-5232)
  - A vulnerability in the Java Runtime Environment (JRE)     may allow malicious JavaScript code that is downloaded     by a browser from a malicious website to make network     connections, through Java APIs, to network services on     machines other than the one that the JavaScript code was     downloaded from. This may allow network resources (such     as web pages) and vulnerabilities (that exist on these     network services) which are not otherwise normally     accessible to be accessed or exploited. (CVE-2007-5274)
  - A second vulnerability in the JRE may allow an untrusted     applet that is downloaded from a malicious website     through a web proxy to make network connections to     network services on machines other than the one that the     applet was downloaded from. This may allow network     resources (such as web pages) and vulnerabilities (that     exist on these network services) which are not otherwise     normally accessible to be accessed or exploited.
    (CVE-2007-5273)
  - An untrusted Java Web Start application may write     arbitrary files with the privileges of the user running     the application. (CVE-2007-5236)
  - Three separate vulnerabilities may allow an untrusted     Java Web Start application to determine the location of     the Java Web Start cache. (CVE-2007-5238)
  - An untrusted Java Web Start application or Java applet     may move or copy arbitrary files by requesting the user     of the application or applet to drag and drop a file     from the Java Web Start application or Java applet     window. (CVE-2007-5239)
  - An untrusted applet may display an over-sized window so     that the applet warning banner is not visible to the     user running the untrusted applet. (CVE-2007-5240)
  - A vulnerability in the font parsing code in the Java     Runtime Environment may allow an untrusted applet to     elevate its privileges. For example, an applet may grant     itself permissions to read and write local files or     execute local applications that are accessible to the     user running the untrusted applet. (CVE-2007-4381)
  - The Java Secure Socket Extension (JSSE) that is included     in various releases of the Java Runtime Environment does     not correctly process SSL/TLS handshake requests. This     vulnerability may be exploited to create a Denial of     Service (DoS) condition to the system as a whole on a     server that listens for SSL/TLS connections using JSSE     for SSL/TLS support. (CVE-2007-3698)
Solution
Apply YOU patch number 12142.
Plugin Details
File Name: suse9_12142.nasl
Agent: unix
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Vulnerability Information
CPE: cpe:/o:suse:suse_linux
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: Exploits are available
Patch Publication Date: 4/16/2008
Exploitable With
CANVAS (D2ExploitPack)
Reference Information
CVE: CVE-2007-3698, CVE-2007-4381, CVE-2007-5232, CVE-2007-5236, CVE-2007-5238, CVE-2007-5239, CVE-2007-5240, CVE-2007-5273, CVE-2007-5274, CVE-2008-1187, CVE-2008-1189, CVE-2008-1190, CVE-2008-1192, CVE-2008-1195, CVE-2008-1196