Scientific Linux Security Update : java-1.8.0-openjdk on SL7.x x86_64 (20160420)

critical Nessus Plugin ID 90618

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

Security Fix(es) :

- Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions.
(CVE-2016-0686, CVE-2016-0687)

- It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws.
(CVE-2016-3427)

- It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425)

- It was discovered that the GCM (Galois/Counter Mode) implementation in the JCE component in OpenJDK used a non-constant time comparison when comparing GCM authentication tags. A remote attacker could possibly use this flaw to determine the value of the authentication tag. (CVE-2016-3426)

- It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected.
(CVE-2016-0695)

Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?0ba423d1

Plugin Details

Severity: Critical

ID: 90618

File Name: sl_20160420_java_1_8_0_openjdk_on_SL7_x.nasl

Version: 2.9

Type: local

Agent: unix

Published: 4/21/2016

Updated: 5/14/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-headless, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-javadoc, x-cpe:/o:fermilab:scientific_linux, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-debuginfo, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-src, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-accessibility-debug, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-javadoc-debug, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-src-debug, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-headless-debug, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-devel-debug, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-demo-debug, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-demo, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-debug, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-accessibility, p-cpe:/a:fermilab:scientific_linux:java-1.8.0-openjdk-devel

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 4/20/2016

Vulnerability Publication Date: 4/21/2016

CISA Known Exploited Vulnerability Due Dates: 6/2/2023

Reference Information

CVE: CVE-2016-0686, CVE-2016-0687, CVE-2016-0695, CVE-2016-3425, CVE-2016-3426, CVE-2016-3427