RHEL 4 : Sun Java Runtime in Satellite Server (RHSA-2009:1662)

critical Nessus プラグイン ID 53539
New! プラグインの深刻度には CVSS v3 が適用されるようになりました。

プラグインの深刻度は、デフォルトで CVSS v3 を使って計算されるように更新されました。プラグインに CVSS v3 スコアがない場合には、CVSS v2 を使って深刻度が計算されます。深刻度の表示設定は、[設定]のドロップダウンで切り替えができます。

概要

The remote Red Hat host is missing one or more security updates.

説明

Updated java-1.5.0-sun packages that correct several security issues are now available for Red Hat Network Satellite Server 5.1.

This update has been rated as having low security impact by the Red Hat Security Response Team.

This update corrects several security vulnerabilities in the Sun Java Runtime Environment shipped as part of Red Hat Network Satellite Server 5.1. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets.

Several flaws were fixed in the Sun Java 5 Runtime Environment.
(CVE-2006-2426, CVE-2008-2086, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1103, CVE-2009-1104, CVE-2009-1107, CVE-2009-2409, CVE-2009-2475, CVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2676, CVE-2009-2689, CVE-2009-3728, CVE-2009-3873, CVE-2009-3876, CVE-2009-3877, CVE-2009-3879, CVE-2009-3880, CVE-2009-3881, CVE-2009-3882, CVE-2009-3883, CVE-2009-3884)

Note: This is the final update for the java-1.5.0-sun packages, as the Sun Java SE Release family 5.0 has now reached End of Service Life. An alternative to Sun Java SE 5.0 is the Java 2 Technology Edition of the IBM Developer Kit for Linux, which is available from the Satellite 5.1 channels on the Red Hat Network.

For a long term solution, Red Hat advises users to switch from Sun Java SE 5.0 to the Java 2 Technology Edition of the IBM Developer Kit for Linux. Refer to the Solution section for instructions.

Users of Red Hat Network Satellite Server 5.1 are advised to upgrade to these updated java-1.5.0-sun packages, which resolve these issues.
All running instances of Sun Java must be restarted for the update to take effect.

ソリューション

Update the affected java-1.5.0-sun and / or java-1.5.0-sun-devel packages.

関連情報

https://access.redhat.com/security/cve/cve-2006-2426

https://access.redhat.com/security/cve/cve-2008-2086

https://access.redhat.com/security/cve/cve-2009-1093

https://access.redhat.com/security/cve/cve-2009-1094

https://access.redhat.com/security/cve/cve-2009-1095

https://access.redhat.com/security/cve/cve-2009-1096

https://access.redhat.com/security/cve/cve-2009-1098

https://access.redhat.com/security/cve/cve-2009-1099

https://access.redhat.com/security/cve/cve-2009-1100

https://access.redhat.com/security/cve/cve-2009-1103

https://access.redhat.com/security/cve/cve-2009-1104

https://access.redhat.com/security/cve/cve-2009-1107

https://access.redhat.com/security/cve/cve-2009-2409

https://access.redhat.com/security/cve/cve-2009-2475

https://access.redhat.com/security/cve/cve-2009-2625

https://access.redhat.com/security/cve/cve-2009-2670

https://access.redhat.com/security/cve/cve-2009-2671

https://access.redhat.com/security/cve/cve-2009-2672

https://access.redhat.com/security/cve/cve-2009-2673

https://access.redhat.com/security/cve/cve-2009-2675

https://access.redhat.com/security/cve/cve-2009-2676

https://access.redhat.com/security/cve/cve-2009-2689

https://access.redhat.com/security/cve/cve-2009-3728

https://access.redhat.com/security/cve/cve-2009-3873

https://access.redhat.com/security/cve/cve-2009-3876

https://access.redhat.com/security/cve/cve-2009-3877

https://access.redhat.com/security/cve/cve-2009-3879

https://access.redhat.com/security/cve/cve-2009-3880

https://access.redhat.com/security/cve/cve-2009-3881

https://access.redhat.com/security/cve/cve-2009-3882

https://access.redhat.com/security/cve/cve-2009-3883

https://access.redhat.com/security/cve/cve-2009-3884

https://access.redhat.com/errata/RHSA-2009:1662

プラグインの詳細

深刻度: Critical

ID: 53539

ファイル名: redhat-RHSA-2009-1662.nasl

バージョン: 1.25

タイプ: local

エージェント: unix

公開日: 2011/4/23

更新日: 2021/1/14

依存関係: ssh_get_info.nasl

リスク情報

VPR

リスクファクター: High

スコア: 7.7

CVSS v2

リスクファクター: Critical

Base Score: 10

Temporal Score: 7.8

ベクトル: AV:N/AC:L/Au:N/C:C/I:C/A:C

現状ベクトル: E:POC/RL:OF/RC:C

脆弱性情報

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.5.0-sun, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-sun-devel, cpe:/o:redhat:enterprise_linux:4

必要な KB アイテム: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

エクスプロイトが利用可能: true

エクスプロイトの容易さ: Exploits are available

パッチ公開日: 2009/12/11

脆弱性公開日: 2006/5/17

エクスプロイト可能

Metasploit (Sun Java JRE AWT setDiffICM Buffer Overflow)

参照情報

CVE: CVE-2006-2426, CVE-2008-2086, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1103, CVE-2009-1104, CVE-2009-1107, CVE-2009-2409, CVE-2009-2475, CVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2676, CVE-2009-2689, CVE-2009-3403, CVE-2009-3728, CVE-2009-3873, CVE-2009-3876, CVE-2009-3877, CVE-2009-3879, CVE-2009-3880, CVE-2009-3881, CVE-2009-3882, CVE-2009-3883, CVE-2009-3884, CVE-2010-0079

BID: 32620, 34240, 35922, 35939, 35943, 35944, 35946, 35958, 36881

RHSA: 2009:1662

CWE: 16, 22, 94, 119, 189, 200, 264, 310, 399