[security-announce] SUSE Security Announcement: IBM Java (SUSE-SA:2008:025)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: IBMJava2,IBMJava5,java-1_4_2-ibm,java-1_5_0-ibm
Announcement ID: SUSE-SA:2008:025
Date: Fri, 25 Apr 2008 14:00:00 +0000
Affected Products: SUSE SLES 9
Open Enterprise Server
Novell Linux POS 9
SUSE Linux Enterprise Desktop 10 SP1
SLE SDK 10 SP1
SUSE Linux Enterprise Server 10 SP1
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2007-3698, CVE-2007-4381, CVE-2007-5232
CVE-2007-5236, CVE-2007-5238, CVE-2007-5239
CVE-2007-5240, CVE-2007-5273, CVE-2007-5274
CVE-2008-0657, CVE-2008-1187, CVE-2008-1188
CVE-2008-1189, CVE-2008-1190, CVE-2008-1192
CVE-2008-1193, CVE-2008-1194, CVE-2008-1195
CVE-2008-1196
Content of This Advisory:
1) Security Vulnerability Resolved:
IBM Java security updates
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
IBM Java 1.4.2 was updated to SR10 and IBM Java 1.5.0 was updated to
SR7 to fix various security issues:
- CVE-2008-1196: A buffer overflow vulnerability in Java Web Start
may allow an untrusted Java Web Start application that is downloaded
from a website to elevate its privileges. For example, an untrusted
Java Web Start application may grant itself permissions to read and
write local files or execute local applications that are accessible
to the user running the untrusted application.
- CVE-2008-1195: A vulnerability in the Java Runtime Environment may
allow JavaScript(TM) code that is downloaded by a browser to make
connections to network services on the system that the browser runs
on, through Java APIs, This may allow files (that are accessible
through these network services) or vulnerabilities (that exist on
these network services) which are not otherwise normally accessible
to be accessed or exploited.
- CVE-2008-1192: A vulnerability in the Java Plug-in may an untrusted
applet to bypass same origin policy and leverage this flaw to
execute local applications that are accessible to the user running
the untrusted applet.
- CVE-2008-1190: A vulnerability in Java Web Start may allow an
untrusted Java Web Start application to elevate its privileges. For
example, an application may grant itself permissions to read and
write local files or execute local applications that are accessible
to the user running the untrusted application.
- CVE-2008-1189: A buffer overflow vulnerability in the Java Runtime
Environment may allow an untrusted applet or application to elevate
its privileges. For example, an applet may grant itself permissions
to read and write local files or execute local applications that
are accessible to the user running the untrusted applet.
- CVE-2008-1187: A vulnerability in the Java Runtime Environment
with parsing XML data may allow an untrusted applet or application
to elevate its privileges. For example, an applet may read certain
URL resources (such as some files and web pages).
- CVE-2007-5232: A vulnerability in the Java Runtime Environment (JRE)
with applet caching may allow an untrusted applet that is
downloaded from a malicious website to make network connections to
network services on machines other than the one that the applet was
downloaded from. This may allow network resources (such as web pages)
and vulnerabilities (that exist on these network services) which
are not otherwise normally accessible to be accessed or exploited.
- CVE-2007-5274: A vulnerability in the Java Runtime Environment (JRE)
may allow malicious Javascript code that is downloaded by a browser
from a malicious website to make network connections, through Java
APIs, to network services on machines other than the one that the
Javascript code was downloaded from. This may allow network resources
(such as web pages) and vulnerabilities (that exist on these network
services) which are not otherwise normally accessible to be accessed
or exploited.
- CVE-2007-5273: A second vulnerability in the JRE may allow an
untrusted applet that is downloaded from a malicious website through
a web proxy to make network connections to network services on
machines other than the one that the applet was downloaded from. This
may allow network resources (such as web pages) and vulnerabilities
(that exist on these network services) which are not otherwise
normally accessible to be accessed or exploited.
- CVE-2007-5236: An untrusted Java Web Start application may
write arbitrary files with the privileges of the user running
the application.
- CVE-2007-5238: Three separate vulnerabilities may allow an untrusted
Java Web Start application to determine the location of the Java
Web Start cache.
- CVE-2007-5239: An untrusted Java Web Start application or Java
applet may move or copy arbitrary files by requesting the user of
the application or applet to drag and drop a file from the Java
Web Start application or Java applet window.
- CVE-2007-5240: An untrusted applet may display an over-sized window
so that the applet warning banner is not visible to the user running
the untrusted applet.
- CVE-2007-4381: A vulnerability in the font parsing code in the
Java Runtime Environment may allow an untrusted applet to elevate
its privileges. For example, an applet may grant itself permissions
to read and write local files or execute local applications that
are accessible to the user running the untrusted applet.
- CVE-2007-3698: The Java Secure Socket Extension (JSSE) that is
included in various releases of the Java Runtime Environment does not
correctly process SSL/TLS handshake requests. This vulnerability may
be exploited to create a Denial of Service (DoS) condition to the
system as a whole on a server that listens for SSL/TLS connections
using JSSE for SSL/TLS support.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please restart running instances of IBM Java.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
participants (1)
-
Marcus Meissner