RHEL 4 / 5 : java-1.5.0-bea (RHSA-2008:0156)

critical Nessus Plugin ID 40716

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated java-1.5.0-bea packages that correct several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The BEA WebLogic JRockit 1.5.0_14 JRE and SDK contain BEA WebLogic JRockit Virtual Machine 1.5.0_14 and are certified for the Java 5 Platform, Standard Edition, v1.5.0.

A flaw in the applet caching mechanism of the Java Runtime Environment (JRE) did not correctly process the creation of network connections. A remote attacker could use this flaw to create connections to services on machines other than the one that the applet was downloaded from.
(CVE-2007-5232)

Untrusted Java Applets were able to drag and drop a file to a Desktop Application. A user-assisted remote attacker could use this flaw to move or copy arbitrary files. (CVE-2007-5239)

The Java Runtime Environment (JRE) allowed untrusted Java Applets or applications to display oversized windows. This could be used by remote attackers to hide security warning banners. (CVE-2007-5240)

Unsigned Java Applets communicating via a HTTP proxy could allow a remote attacker to violate the Java security model. A cached, malicious Applet could create network connections to services on other machines. (CVE-2007-5273)

Two vulnerabilities in the Java Runtime Environment allowed an untrusted application or applet to elevate the assigned privileges.
This could be misused by a malicious website to read and write local files or execute local applications in the context of the user running the Java process. (CVE-2008-0657)

Those vulnerabilities concerned with applets can only be triggered in java-1.5.0-bea by calling the 'appletviewer' application.

All users of java-1.5.0-bea should upgrade to these updated packages, which contain the BEA WebLogic JRockit 1.5.0_14 release that resolves these issues.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2007-5232

https://access.redhat.com/security/cve/cve-2007-5239

https://access.redhat.com/security/cve/cve-2007-5240

https://access.redhat.com/security/cve/cve-2007-5273

https://access.redhat.com/security/cve/cve-2008-0657

http://www.nessus.org/u?7dd1a2b1

https://access.redhat.com/errata/RHSA-2008:0156

Plugin Details

Severity: Critical

ID: 40716

File Name: redhat-RHSA-2008-0156.nasl

Version: 1.25

Type: local

Agent: unix

Published: 8/24/2009

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.5.0-bea, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-bea-demo, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-bea-devel, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-bea-jdbc, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-bea-missioncontrol, p-cpe:/a:redhat:enterprise_linux:java-1.5.0-bea-src, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.6, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:5.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/5/2008

Vulnerability Publication Date: 10/5/2007

Reference Information

CVE: CVE-2007-5232, CVE-2007-5239, CVE-2007-5240, CVE-2007-5273, CVE-2008-0657

BID: 25918, 27650

CWE: 264

RHSA: 2008:0156