RHEL 5 : java-1.6.0-sun (RHSA-2010:0337)

critical Nessus Plugin ID 46293

Language:

Synopsis

The remote Red Hat host is missing one or more security updates for java-1.6.0-sun.

Description

The remote Redhat Enterprise Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2010:0337 advisory.

The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit.

This update fixes several vulnerabilities in the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. Further information about these flaws can be found on the Oracle Java SE and Java for Business Critical Patch Update Advisory page, listed in the References section. (CVE-2009-3555, CVE-2010-0082, CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088, CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092, CVE-2010-0093, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0845, CVE-2010-0846, CVE-2010-0847, CVE-2010-0848, CVE-2010-0849)

For the CVE-2009-3555 issue, this update disables renegotiation in the Java Secure Socket Extension (JSSE) component. Unsafe renegotiation can be re-enabled using the sun.security.ssl.allowUnsafeRenegotiation property.
Refer to the following Knowledgebase article for details:
http://kbase.redhat.com/faq/docs/DOC-20491

Users of java-1.6.0-sun should upgrade to these updated packages, which correct these issues. All running instances of Sun Java must be restarted for the update to take effect.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL java-1.6.0-sun package based on the guidance in RHSA-2010:0337.

See Also

http://kbase.redhat.com/faq/docs/DOC-20491

http://www.nessus.org/u?6dbc9390

https://access.redhat.com/security/updates/classification/#critical

https://bugzilla.redhat.com/show_bug.cgi?id=533125

https://bugzilla.redhat.com/show_bug.cgi?id=575736

https://bugzilla.redhat.com/show_bug.cgi?id=575740

https://bugzilla.redhat.com/show_bug.cgi?id=575747

https://bugzilla.redhat.com/show_bug.cgi?id=575755

https://bugzilla.redhat.com/show_bug.cgi?id=575756

https://bugzilla.redhat.com/show_bug.cgi?id=575760

https://bugzilla.redhat.com/show_bug.cgi?id=575764

https://bugzilla.redhat.com/show_bug.cgi?id=575769

https://bugzilla.redhat.com/show_bug.cgi?id=575772

https://bugzilla.redhat.com/show_bug.cgi?id=575775

https://bugzilla.redhat.com/show_bug.cgi?id=575808

https://bugzilla.redhat.com/show_bug.cgi?id=575818

https://bugzilla.redhat.com/show_bug.cgi?id=575846

https://bugzilla.redhat.com/show_bug.cgi?id=575854

https://bugzilla.redhat.com/show_bug.cgi?id=575865

https://bugzilla.redhat.com/show_bug.cgi?id=575871

https://bugzilla.redhat.com/show_bug.cgi?id=578430

https://bugzilla.redhat.com/show_bug.cgi?id=578432

https://bugzilla.redhat.com/show_bug.cgi?id=578433

https://bugzilla.redhat.com/show_bug.cgi?id=578436

https://bugzilla.redhat.com/show_bug.cgi?id=578437

https://bugzilla.redhat.com/show_bug.cgi?id=578440

http://www.nessus.org/u?b93c78e2

https://access.redhat.com/errata/RHSA-2010:0337

Plugin Details

Severity: Critical

ID: 46293

File Name: redhat-RHSA-2010-0337.nasl

Version: 1.40

Type: local

Agent: unix

Published: 5/11/2010

Updated: 11/4/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

Vendor

Vendor Severity: Critical

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2010-0849

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2009-3555

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun-devel, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun-jdbc, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun-plugin, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun-src, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun-demo, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-sun

Required KB Items: Host/cpu, Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/31/2010

Vulnerability Publication Date: 11/9/2009

CISA Known Exploited Vulnerability Due Dates: 6/15/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Java MixerSequencer Object GM_Song Structure Handling Vulnerability)

Reference Information

CVE: CVE-2009-3555, CVE-2010-0082, CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088, CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092, CVE-2010-0093, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0845, CVE-2010-0846, CVE-2010-0847, CVE-2010-0848, CVE-2010-0849

BID: 36935, 39062, 39065, 39067, 39068, 39069, 39070, 39071, 39072, 39073, 39075, 39077, 39078, 39081, 39083, 39084, 39085, 39086, 39088, 39089, 39090, 39091, 39093, 39094, 39095, 39096

CWE: 190, 300, 367

RHSA: 2010:0337