Rapid7 Vulnerability & Exploit Database

RHSA-2008:0790: java-1.5.0-ibm security update

Back to Search

RHSA-2008:0790: java-1.5.0-ibm security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
07/09/2008
Created
07/25/2018
Added
09/09/2008
Modified
07/04/2017

Description

The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment andthe IBM Java 2 Software Development Kit.Multiple vulnerabilities with unsigned applets were reported. A remoteattacker could misuse an unsigned applet to connect to localhost servicesrunning on the host running the applet. (CVE-2008-3104) A vulnerability in the XML processing API was found. A remote attacker whocaused malicious XML to be processed by an untrusted applet or applicationwas able to elevate permissions to access URLs on a remote host.(CVE-2008-3106)A buffer overflow vulnerability was found in the font processing code. Thisallowed remote attackers to extend the permissions of an untrusted appletor application, allowing it to read and/or write local files, as well as toexecute local applications accessible to the user running the untrustedapplication. (CVE-2008-3108)Several buffer overflow vulnerabilities in Java Web Start were reported.These vulnerabilities allowed an untrusted Java Web Start application toelevate its privileges, allowing it to read and/or write local files, aswell as to execute local applications accessible to the user running theuntrusted application. (CVE-2008-3111)Two file processing vulnerabilities in Java Web Start were found. A remoteattacker, by means of an untrusted Java Web Start application, was able tocreate or delete arbitrary files with the permissions of the user runningthe untrusted application. (CVE-2008-3112, CVE-2008-3113)A vulnerability in Java Web Start when processing untrusted applicationswas reported. An attacker was able to acquire sensitive information, suchas the cache location. (CVE-2008-3114)All users of java-1.5.0-ibm are advised to upgrade to these updatedpackages, that contain the IBM 1.5.0 SR8 Java release, which resolvesthese issues.

Solution(s)

  • redhat-upgrade-java-1-5-0-ibm
  • redhat-upgrade-java-1-5-0-ibm-accessibility
  • redhat-upgrade-java-1-5-0-ibm-demo
  • redhat-upgrade-java-1-5-0-ibm-devel
  • redhat-upgrade-java-1-5-0-ibm-javacomm
  • redhat-upgrade-java-1-5-0-ibm-jdbc
  • redhat-upgrade-java-1-5-0-ibm-plugin
  • redhat-upgrade-java-1-5-0-ibm-src

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;