Rapid7 Vulnerability & Exploit Database

RHSA-2010:0130: java-1.5.0-ibm security update

Back to Search

RHSA-2010:0130: java-1.5.0-ibm security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
04/01/2010
Created
07/25/2018
Added
04/01/2010
Modified
07/04/2017

Description

The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment andthe IBM Java 2 Software Development Kit.A flaw was found in the way the TLS/SSL (Transport Layer Security/SecureSockets Layer) protocols handle session renegotiation. A man-in-the-middleattacker could use this flaw to prefix arbitrary plain text to a client'ssession (for example, an HTTPS connection to a website). This could forcethe server to process an attacker's request as if authenticated using thevictim's credentials. (CVE-2009-3555)This update disables renegotiation in the Java Secure Socket Extension(JSSE) component. Unsafe renegotiation can be re-enabled using thecom.ibm.jsse2.renegotiate property. Refer to the following Knowledgebasearticle for details: http://kbase.redhat.com/faq/docs/DOC-20491All users of java-1.5.0-ibm are advised to upgrade to these updatedpackages, containing the IBM 1.5.0 SR11-FP1 Java release. All runninginstances of IBM Java must be restarted for this update to take effect.

Solution(s)

  • redhat-upgrade-java-1-5-0-ibm
  • redhat-upgrade-java-1-5-0-ibm-accessibility
  • redhat-upgrade-java-1-5-0-ibm-demo
  • redhat-upgrade-java-1-5-0-ibm-devel
  • redhat-upgrade-java-1-5-0-ibm-javacomm
  • redhat-upgrade-java-1-5-0-ibm-jdbc
  • redhat-upgrade-java-1-5-0-ibm-plugin
  • redhat-upgrade-java-1-5-0-ibm-src

References

  • redhat-upgrade-java-1-5-0-ibm
  • redhat-upgrade-java-1-5-0-ibm-accessibility
  • redhat-upgrade-java-1-5-0-ibm-demo
  • redhat-upgrade-java-1-5-0-ibm-devel
  • redhat-upgrade-java-1-5-0-ibm-javacomm
  • redhat-upgrade-java-1-5-0-ibm-jdbc
  • redhat-upgrade-java-1-5-0-ibm-plugin
  • redhat-upgrade-java-1-5-0-ibm-src

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;