SuSE: 2010-004: IBM Java 6 security update Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: java-1_6_0-ibm
Announcement ID: SUSE-SA:2010:004
Date: Tue, 12 Jan 2010 17:00:00 +0000
Affected Products: SLE 11
SLES 11
Vulnerability Type: remote code execution
CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
SUSE Default Package: yes
Cross-References: CVE-2009-0217, CVE-2009-3865, CVE-2009-3866
CVE-2009-3867, CVE-2009-3868, CVE-2009-3869
CVE-2009-3871, CVE-2009-3872, CVE-2009-3873
CVE-2009-3874, CVE-2009-3875, CVE-2009-3876
CVE-2009-3877
Content of This Advisory:
1) Security Vulnerability Resolved:
IBM Java 6 security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
IBM Java 6 was updated to Service Refresh 7.
The following security issues were fixed:
CVE-2009-3876
CVE-2009-3877: A vulnerability in the Java Runtime Environment with
decoding DER encoded data might allow a remote client to cause the
JRE to crash, resulting in a denial of service condition.
CVE-2009-3867: A buffer overflow vulnerability in the Java Runtime
Environment audio system might allow an untrusted applet or Java Web
Start application to escalate privileges. For example, an untrusted
applet might grant itself permissions to read and write local files,
or run local applications that are accessible to the user running
the untrusted applet.
CVE-2009-3868: A buffer overflow vulnerability in the Java Runtime
Environment with parsing image files might allow an untrusted applet
or Java Web Start application to escalate privileges. For example,
an untrusted applet might grant itself permissions to read and write
local files, or run local applications that are accessible to the
user running the untrusted applet.
CVE-2009-3872: An integer overflow vulnerability in the Java Runtime
Environment with reading JPEG files might allow an untrusted applet
or Java Web Start application to escalate privileges. For example,
an untrusted applet might grant itself permissions to read and write
local files, or run local applications that are accessible to the
user running the untrusted applet.
CVE-2009-3873: A buffer overflow vulnerability in the Java Runtime
Environment with processing JPEG files might allow an untrusted applet
or Java Web Start application to escalate privileges. For example,
an untrusted applet might grant itself permissions to read and write
local files, or run local applications that are accessible to the
user running the untrusted applet.
CVE-2009-3875: A security vulnerability in the Java Runtime
Environment with verifying HMAC digests might allow authentication to
be bypassed. This action can allow a user to forge a digital signature
that would be accepted as valid. Applications that validate HMAC-based
digital signatures might be vulnerable to this type of attack.
CVE-2009-3865: A command execution vulnerability in the Java Runtime
Environment Deployment Toolkit might be used to run arbitrary
code. This issue might occur as the result of a user of the Java
Runtime Environment viewing a specially crafted web page that exploits
this vulnerability.
CVE-2009-3869: A buffer overflow vulnerability in the Java Runtime
Environment with processing image files might allow an untrusted applet
or Java Web Start application to escalate privileges. For example,
an untrusted applet might grant itself permissions to read and write
local files or run local applications that are accessible to the user
running the untrusted applet.
CVE-2009-3871: A buffer overflow vulnerability in the Java Runtime
Environment with processing image files might allow an untrusted applet
or Java Web Start application to escalate privileges. For example,
an untrusted applet might grant itself permissions to read and write
local files or run local applications that are accessible to the user
running the untrusted applet.
CVE-2009-3866: A security vulnerability in the Java Web Start Installer
might be used to allow an untrusted Java Web Start application to
run as a trusted application and run arbitrary code. This issue might
occur as the result of a user of the Java Runtime Environment viewing
a specially crafted web page that exploits this vulnerability.
CVE-2009-3874: An integer overflow vulnerability in the Java Runtime
Environment with processing JPEG images might allow an untrusted applet
or Java Web Start application to escalate privileges. For example,
an untrusted applet might grant itself permissions to read and write
local files or run local applications that are accessible to the user
running the untrusted applet.
CVE-2009-0217: A vulnerability with verifying HMAC-based XML digital
signatures in the XML Digital Signature implementation included with
the Java Runtime Environment (JRE) might allow authentication to be
bypassed. Applications that validate HMAC-based XML digital signatures
might be vulnerable to this type of attack.
Note: This vulnerability cannot be exploited by an untrusted applet
or Java Web Start application.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of IBM Java 6 applications after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References