Rapid7 Vulnerability & Exploit Database

RHSA-2008:0210: java-1.5.0-ibm security update

Back to Search

RHSA-2008:0210: java-1.5.0-ibm security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
02/07/2008
Created
07/25/2018
Added
05/21/2008
Modified
07/04/2017

Description

IBM's 1.5.0 Java release includes the IBM Java 2 Runtime Environment andthe IBM Java 2 Software Development Kit.Two vulnerabilities in the Java Runtime Environment allowed an untrustedapplication or applet to elevate the assigned privileges. This could bemisused by a malicious website to read and write local files or executelocal applications in the context of the user running the Java process.(CVE-2008-0657) A flaw was found in the Java XSLT processing classes. An untrustedapplication or applet could cause a denial of service, or execute arbitrarycode with the permissions of the user running the JRE. (CVE-2008-1187) Several buffer overflow flaws were found in Java Web Start (JWS). Anuntrusted JNLP application could access local files or execute localapplications accessible to the user running the JRE.(CVE-2008-1188, CVE-2008-1189, CVE-2008-1190, CVE-2008-1196) A flaw was found in the Java Plug-in. A remote attacker could bypass thesame origin policy, executing arbitrary code with the permissions of theuser running the JRE. (CVE-2008-1192) A flaw was found in the JRE image parsing libraries. An untrustedapplication or applet could cause a denial of service, or possible executearbitrary code with the permissions of the user running the JRE.(CVE-2008-1193)A flaw was found in the JRE color management library. An untrustedapplication or applet could trigger a denial of service (JVM crash).(CVE-2008-1194)The JRE allowed untrusted JavaScript code to create local networkconnections by the use of Java APIs. A remote attacker could use theseflaws to acesss local network services. (CVE-2008-1195) All users of java-ibm-1.5.0 are advised to upgrade to these updatedpackages, that contain IBM's 1.5.0 SR7 Java release which resolves theseissues.

Solution(s)

  • redhat-upgrade-java-1-5-0-ibm
  • redhat-upgrade-java-1-5-0-ibm-accessibility
  • redhat-upgrade-java-1-5-0-ibm-demo
  • redhat-upgrade-java-1-5-0-ibm-devel
  • redhat-upgrade-java-1-5-0-ibm-javacomm
  • redhat-upgrade-java-1-5-0-ibm-jdbc
  • redhat-upgrade-java-1-5-0-ibm-plugin
  • redhat-upgrade-java-1-5-0-ibm-src

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;