- Issued:
- 2008-03-06
- Updated:
- 2008-03-06
RHSA-2008:0186 - Security Advisory
Synopsis
Critical: java-1.5.0-sun security update
Type/Severity
Security Advisory: Critical
Topic
Updated java-1.5.0-sun packages that correct several security issues are
now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Description
The Java Runtime Environment (JRE) contains the software and tools
that users need to run applets and applications written using the Java
programming language.
Flaws in the JRE allowed an untrusted application or applet to elevate its
privileges. This could be exploited by a remote attacker to access local
files or execute local applications accessible to the user running the JRE
(CVE-2008-1185, CVE-2008-1186)
A flaw was found in the Java XSLT processing classes. An untrusted
application or applet could cause a denial of service, or execute arbitrary
code with the permissions of the user running the JRE. (CVE-2008-1187)
Several buffer overflow flaws were found in Java Web Start (JWS). An
untrusted JNLP application could access local files or execute local
applications accessible to the user running the JRE.
(CVE-2008-1188, CVE-2008-1189, CVE-2008-1190, CVE-2008-1191, CVE-2008-1196)
A flaw was found in the Java Plug-in. A remote attacker could bypass the
same origin policy, executing arbitrary code with the permissions of the
user running the JRE. (CVE-2008-1192)
A flaw was found in the JRE image parsing libraries. An untrusted
application or applet could cause a denial of service, or possible execute
arbitrary code with the permissions of the user running the JRE.
(CVE-2008-1193)
A flaw was found in the JRE color management library. An untrusted
application or applet could trigger a denial of service (JVM crash).
(CVE-2008-1194)
The JRE allowed untrusted JavaScript code to create local network
connections by the use of Java APIs. A remote attacker could use these
flaws to acesss local network services. (CVE-2008-1195)
This update also fixes an issue where the Java Plug-in is not available for
browser use after successful installation.
Users of java-1.5.0-sun should upgrade to these updated packages, which
correct these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4ES x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4ES i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4AS x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4AS i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 436029 - CVE-2008-1185 Untrusted applet and application privilege escalation (CVE-2008-1186)
- BZ - 436030 - CVE-2008-1187 Untrusted applet and application XSLT processing privilege escalation
- BZ - 436293 - CVE-2008-1188 Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190, CVE-2008-1191)
- BZ - 436295 - CVE-2008-1192 Java Plugin same-origin-policy bypass
- BZ - 436296 - CVE-2008-1193 JRE image parsing library allows privilege escalation (CVE-2008-1194)
- BZ - 436299 - CVE-2008-1195 Java-API calls in untrusted Javascript allow network privilege escalation
- BZ - 436302 - CVE-2008-1196 Buffer overflow security vulnerabilities in Java Web Start
CVEs
References
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-233321-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-233322-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-233323-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-233324-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-233325-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-233326-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-233327-1
- http://www.redhat.com/security/updates/classification/#critical
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.