RHEL 5 : Red Hat Network Satellite Server IBM Java Runtime (RHSA-2010:0471)

critical Nessus Plugin ID 47017

Language:

Synopsis

The remote Red Hat host is missing one or more security updates for Red Hat Network Satellite Server IBM Java Runtime.

Description

The remote Redhat Enterprise Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2010:0471 advisory.

This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Network Satellite Server 5.3. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets.

Several flaws were fixed in the IBM Java 2 Runtime Environment.
(CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088, CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0846, CVE-2010-0848, CVE-2010-0849)

Users of Red Hat Network Satellite Server 5.3 are advised to upgrade to these updated java-1.6.0-ibm packages, which resolve these issues. For this update to take effect, Red Hat Network Satellite Server must be restarted (/usr/sbin/rhn-satellite restart), as well as all running instances of IBM Java.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL Red Hat Network Satellite Server IBM Java Runtime package based on the guidance in RHSA-2010:0471.

See Also

http://www.nessus.org/u?132de00e

http://www.redhat.com/security/updates/classification/#low

https://bugzilla.redhat.com/show_bug.cgi?id=575740

https://bugzilla.redhat.com/show_bug.cgi?id=575747

https://bugzilla.redhat.com/show_bug.cgi?id=575755

https://bugzilla.redhat.com/show_bug.cgi?id=575756

https://bugzilla.redhat.com/show_bug.cgi?id=575760

https://bugzilla.redhat.com/show_bug.cgi?id=575769

https://bugzilla.redhat.com/show_bug.cgi?id=575772

https://bugzilla.redhat.com/show_bug.cgi?id=575808

https://bugzilla.redhat.com/show_bug.cgi?id=575818

https://bugzilla.redhat.com/show_bug.cgi?id=575846

https://bugzilla.redhat.com/show_bug.cgi?id=575854

https://bugzilla.redhat.com/show_bug.cgi?id=575865

https://bugzilla.redhat.com/show_bug.cgi?id=578430

https://bugzilla.redhat.com/show_bug.cgi?id=578432

https://bugzilla.redhat.com/show_bug.cgi?id=578433

https://bugzilla.redhat.com/show_bug.cgi?id=578436

https://bugzilla.redhat.com/show_bug.cgi?id=578437

https://bugzilla.redhat.com/show_bug.cgi?id=578440

https://access.redhat.com/errata/RHSA-2010:0471

Plugin Details

Severity: Critical

ID: 47017

File Name: redhat-RHSA-2010-0471.nasl

Version: 1.36

Type: local

Agent: unix

Published: 6/15/2010

Updated: 11/4/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

Vendor

Vendor Severity: Low

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2010-0849

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2010-0840

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/14/2010

Vulnerability Publication Date: 4/1/2010

CISA Known Exploited Vulnerability Due Dates: 6/15/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Java MixerSequencer Object GM_Song Structure Handling Vulnerability)

Reference Information

CVE: CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088, CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0846, CVE-2010-0847, CVE-2010-0848, CVE-2010-0849

BID: 39062, 39065, 39067, 39068, 39069, 39070, 39072, 39073, 39075, 39077, 39078, 39081, 39083, 39084, 39086, 39090, 39091, 39093, 39094, 39095, 39096

CWE: 190, 367

RHSA: 2010:0471