Rapid7 Vulnerability & Exploit Database

RHSA-2015:0809: java-1.8.0-openjdk security update

Back to Search

RHSA-2015:0809: java-1.8.0-openjdk security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
04/16/2015
Created
07/25/2018
Added
04/20/2015
Modified
07/04/2017

Description

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java RuntimeEnvironment and the OpenJDK 8 Java Software Development Kit.An off-by-one flaw, leading to a buffer overflow, was found in the fontparsing code in the 2D component in OpenJDK. A specially crafted font filecould possibly cause the Java Virtual Machine to execute arbitrary code,allowing an untrusted Java application or applet to bypass Java sandboxrestrictions. (CVE-2015-0469)A flaw was found in the way the Hotspot component in OpenJDK handledphantom references. An untrusted Java application or applet could use thisflaw to corrupt the Java Virtual Machine memory and, possibly, executearbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0460)A flaw was found in the way the JSSE component in OpenJDK parsed X.509certificate options. A specially crafted certificate could cause JSSE toraise an exception, possibly causing an application using JSSE to exitunexpectedly. (CVE-2015-0488)Multiple flaws were discovered in the Beans and Hotspot components inOpenJDK. An untrusted Java application or applet could use these flaws tobypass certain Java sandbox restrictions. (CVE-2015-0477, CVE-2015-0470)A directory traversal flaw was found in the way the jar tool extracted JARarchive files. A specially crafted JAR archive could cause jar to overwritearbitrary files writable by the user running jar when the archive wasextracted. (CVE-2005-1080, CVE-2015-0480)It was found that the RSA implementation in the JCE component in OpenJDKdid not follow recommended practices for implementing RSA signatures.(CVE-2015-0478)The CVE-2015-0478 issue was discovered by Florian Weimer of Red HatProduct Security.All users of java-1.8.0-openjdk are advised to upgrade to these updatedpackages, which resolve these issues. All running instances of OpenJDK Javamust be restarted for the update to take effect.

Solution(s)

  • redhat-upgrade-java-1-8-0-openjdk
  • redhat-upgrade-java-1-8-0-openjdk-accessibility
  • redhat-upgrade-java-1-8-0-openjdk-debuginfo
  • redhat-upgrade-java-1-8-0-openjdk-demo
  • redhat-upgrade-java-1-8-0-openjdk-devel
  • redhat-upgrade-java-1-8-0-openjdk-headless
  • redhat-upgrade-java-1-8-0-openjdk-javadoc
  • redhat-upgrade-java-1-8-0-openjdk-src

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;