RHEL 5 / 6 : java-1.5.0-ibm (RHSA-2012:0508)

high Nessus Plugin ID 58840

Synopsis

The remote Red Hat host is missing one or more security updates for java-1.5.0-ibm.

Description

The remote Redhat Enterprise Linux 5 / 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2012:0508 advisory.

- HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) (CVE-2011-3389)

- OpenJDK: RMI registry privileged code execution (RMI, 7083012) (CVE-2011-3557)

- OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) (CVE-2011-3560)

- OpenJDK: JavaSound incorrect bounds check (Sound, 7088367) (CVE-2011-3563)

- Oracle JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) (CVE-2012-0498, CVE-2012-0499)

- OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283) (CVE-2012-0501)

- OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683) (CVE-2012-0502)

- OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687) (CVE-2012-0503)

- OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700) (CVE-2012-0505)

- OpenJDK: mutable repository identifiers (CORBA, 7110704) (CVE-2012-0506)

- OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299) (CVE-2012-0507)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL java-1.5.0-ibm package based on the guidance in RHSA-2012:0508.

See Also

http://www.ibm.com/developerworks/java/jdk/alerts/

http://www.nessus.org/u?0e0914c4

https://access.redhat.com/errata/RHSA-2012:0508

https://access.redhat.com/security/updates/classification/#critical

https://bugzilla.redhat.com/show_bug.cgi?id=737506

https://bugzilla.redhat.com/show_bug.cgi?id=745379

https://bugzilla.redhat.com/show_bug.cgi?id=745464

https://bugzilla.redhat.com/show_bug.cgi?id=788624

https://bugzilla.redhat.com/show_bug.cgi?id=788976

https://bugzilla.redhat.com/show_bug.cgi?id=788994

https://bugzilla.redhat.com/show_bug.cgi?id=789295

https://bugzilla.redhat.com/show_bug.cgi?id=789297

https://bugzilla.redhat.com/show_bug.cgi?id=789299

https://bugzilla.redhat.com/show_bug.cgi?id=789300

https://bugzilla.redhat.com/show_bug.cgi?id=790720

https://bugzilla.redhat.com/show_bug.cgi?id=790722

Plugin Details

Severity: High

ID: 58840

File Name: redhat-RHSA-2012-0508.nasl

Version: 1.33

Type: local

Agent: unix

Published: 4/24/2012

Updated: 4/27/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.9

Vendor

Vendor Severity: Critical

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2012-0507

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2011-3389

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-ibm-accessibility, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-ibm-jdbc, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-ibm-plugin, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-ibm-demo, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-ibm-javacomm, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-ibm-src, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-ibm-devel

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/23/2012

Vulnerability Publication Date: 9/6/2011

CISA Known Exploited Vulnerability Due Dates: 3/24/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Java AtomicReferenceArray Type Violation Vulnerability)

Reference Information

CVE: CVE-2011-3389, CVE-2011-3557, CVE-2011-3560, CVE-2011-3563, CVE-2012-0498, CVE-2012-0499, CVE-2012-0501, CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507

BID: 49778, 50234, 50236, 52011, 52012, 52013, 52014, 52016, 52017, 52018, 52019, 52161

CWE: 193

RHSA: 2012:0508