SuSE: 2010-003: IBM Java 1.4.2 Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: java-1_4_2-ibm
Announcement ID: SUSE-SA:2010:003
Date: Tue, 12 Jan 2010 17:00:00 +0000
Affected Products: SUSE SLES 9
Open Enterprise Server
Novell Linux POS 9
SLE SDK 10 SP2
SLE SDK 10 SP3
SUSE Linux Enterprise Server 10 SP2
SUSE Linux Enterprise Server 10 SP3
SLE 11
SLES 11
Vulnerability Type: remote code execution
CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
SUSE Default Package: yes
Cross-References: CVE-2009-3867, CVE-2009-3869, CVE-2009-3871
CVE-2009-3874, CVE-2009-3875
Content of This Advisory:
1) Security Vulnerability Resolved:
IBM Java 1.4.2 security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
IBM Java 1.4.2 was updated to 13 FP3.
The following security issues were fixed:
CVE-2009-3867: A buffer overflow vulnerability in the Java Runtime
Environment audio system might allow an untrusted applet or Java Web
Start application to escalate privileges. For example, an untrusted
applet might grant itself permissions to read and write local files,
or run local applications that are accessible to the user running
the untrusted applet.
CVE-2009-3875: A security vulnerability in the Java Runtime
Environment with verifying HMAC digests might allow authentication to
be bypassed. This action can allow a user to forge a digital signature
that would be accepted as valid. Applications that validate HMAC-based
digital signatures might be vulnerable to this type of attack.
CVE-2009-3869: A buffer overflow vulnerability in the Java Runtime
Environment with processing image files might allow an untrusted applet
or Java Web Start application to escalate privileges. For example,
an untrusted applet might grant itself permissions to read and write
local files or run local applications that are accessible to the user
running the untrusted applet.
CVE-2009-3871: A buffer overflow vulnerability in the Java Runtime
Environment with processing image files might allow an untrusted applet
or Java Web Start application to escalate privileges. For example,
an untrusted applet might grant itself permissions to read and write
local files or run local applications that are accessible to the user
running the untrusted applet.
CVE-2009-3874: An integer overflow vulnerability in the Java Runtime
Environment with processing JPEG images might allow an untrusted applet
or Java Web Start application to escalate privileges. For example,
an untrusted applet might grant itself permissions to read and write
local files or run local applications that are accessible to the user
running the untrusted applet.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of IBM Java 1.4.2 after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References