The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment andthe IBM Java 2 Software Development Kit.Multiple vulnerabilities with unsigned applets were reported. A remoteattacker could misuse an unsigned applet to connect to localhost servicesrunning on the host running the applet. (CVE-2008-3104) A vulnerability in the XML processing API was found. A remote attacker whocaused malicious XML to be processed by an untrusted applet or applicationwas able to elevate permissions to access URLs on a remote host.(CVE-2008-3106)A buffer overflow vulnerability was found in the font processing code. Thisallowed remote attackers to extend the permissions of an untrusted appletor application, allowing it to read and/or write local files, as well as toexecute local applications accessible to the user running the untrustedapplication. (CVE-2008-3108)Several buffer overflow vulnerabilities in Java Web Start were reported.These vulnerabilities allowed an untrusted Java Web Start application toelevate its privileges, allowing it to read and/or write local files, aswell as to execute local applications accessible to the user running theuntrusted application. (CVE-2008-3111)Two file processing vulnerabilities in Java Web Start were found. A remoteattacker, by means of an untrusted Java Web Start application, was able tocreate or delete arbitrary files with the permissions of the user runningthe untrusted application. (CVE-2008-3112, CVE-2008-3113)A vulnerability in Java Web Start when processing untrusted applicationswas reported. An attacker was able to acquire sensitive information, suchas the cache location. (CVE-2008-3114)All users of java-1.5.0-ibm are advised to upgrade to these updatedpackages, that contain the IBM 1.5.0 SR8 Java release, which resolvesthese issues.