rhsa-2008_0636
Vulnerability from csaf_redhat
Published
2008-08-13 14:18
Modified
2024-11-14 10:06
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Sun Java Runtime security update

Notes

Topic
Red Hat Network Satellite Server version 5.1.1 is now available. This update includes fixes for a number of security issues in the Red Hat Network Satellite Server Sun Java Runtime Environment. This update has been rated as having low security impact by the Red Hat Security Response Team.
Details
This release corrects several security vulnerabilities in the Sun Java Runtime Environment shipped as part of Red Hat Network Satellite Server 5.1. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. Multiple flaws were fixed in the Sun Java 1.5.0 Runtime Environment. (CVE-2008-3103, CVE-2008-3104, CVE-2008-3107, CVE-2008-3111, CVE-2008-3112, CVE-2008-3113, CVE-2008-3114) Users of Red Hat Network Satellite Server 5.1 are advised to upgrade to 5.1.1, which resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in the Red Hat\nNetwork Satellite Server Sun Java Runtime Environment.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This release corrects several security vulnerabilities in the Sun Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.1. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nMultiple flaws were fixed in the Sun Java 1.5.0 Runtime Environment.\n(CVE-2008-3103, CVE-2008-3104, CVE-2008-3107, CVE-2008-3111, CVE-2008-3112,\nCVE-2008-3113, CVE-2008-3114)\n\nUsers of Red Hat Network Satellite Server 5.1 are advised to upgrade to\n5.1.1, which resolves these issues.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2008:0636",
        "url": "https://access.redhat.com/errata/RHSA-2008:0636"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "452658",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452658"
      },
      {
        "category": "external",
        "summary": "452659",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452659"
      },
      {
        "category": "external",
        "summary": "454601",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454601"
      },
      {
        "category": "external",
        "summary": "454605",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454605"
      },
      {
        "category": "external",
        "summary": "454606",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454606"
      },
      {
        "category": "external",
        "summary": "454607",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454607"
      },
      {
        "category": "external",
        "summary": "454608",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454608"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0636.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Sun Java Runtime security update",
    "tracking": {
      "current_release_date": "2024-11-14T10:06:19+00:00",
      "generator": {
        "date": "2024-11-14T10:06:19+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2008:0636",
      "initial_release_date": "2008-08-13T14:18:00+00:00",
      "revision_history": [
        {
          "date": "2008-08-13T14:18:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2008-08-13T10:18:21+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-14T10:06:19+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)",
                "product": {
                  "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)",
                  "product_id": "4AS-RHNSAT5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:network_satellite:5.1::el4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Satellite"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64",
                "product": {
                  "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64",
                  "product_id": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.16-1jpp.2.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
                "product": {
                  "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
                  "product_id": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2.el4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
                "product": {
                  "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
                  "product_id": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.16-1jpp.2.el4?arch=i586"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
                "product": {
                  "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
                  "product_id": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2.el4?arch=i586"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
          "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586"
        },
        "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
        "relates_to_product_reference": "4AS-RHNSAT5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
          "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64"
        },
        "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
        "relates_to_product_reference": "4AS-RHNSAT5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
          "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586"
        },
        "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
        "relates_to_product_reference": "4AS-RHNSAT5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
          "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
        },
        "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64",
        "relates_to_product_reference": "4AS-RHNSAT5.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-3103",
      "discovery_date": "2008-06-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452659"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in the Java Management Extensions (JMX) management agent in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier, when local monitoring is enabled, allows remote attackers to \"perform unauthorized operations\" via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenJDK JMX allows illegal operations with local monitoring (6332953)",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-3103"
        },
        {
          "category": "external",
          "summary": "RHBZ#452659",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452659"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3103",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-3103"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3103",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3103"
        }
      ],
      "release_date": "2008-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-08-13T14:18:00+00:00",
          "details": "This update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html",
          "product_ids": [
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0636"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "OpenJDK JMX allows illegal operations with local monitoring (6332953)"
    },
    {
      "cve": "CVE-2008-3104",
      "discovery_date": "2008-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "454601"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet\u0027s outbound connections by connecting to localhost services running on the machine that loaded the applet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Java RE allows Same Origin Policy to be Bypassed (6687932)",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-3104"
        },
        {
          "category": "external",
          "summary": "RHBZ#454601",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454601"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3104",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-3104"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3104",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3104"
        }
      ],
      "release_date": "2008-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-08-13T14:18:00+00:00",
          "details": "This update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html",
          "product_ids": [
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0636"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Java RE allows Same Origin Policy to be Bypassed (6687932)"
    },
    {
      "cve": "CVE-2008-3107",
      "discovery_date": "2008-06-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452658"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in the Virtual Machine in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "JDK untrusted applet/application privilege escalation (6661918)",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-3107"
        },
        {
          "category": "external",
          "summary": "RHBZ#452658",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452658"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3107",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-3107"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3107",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3107"
        }
      ],
      "release_date": "2008-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-08-13T14:18:00+00:00",
          "details": "This update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html",
          "product_ids": [
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0636"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "JDK untrusted applet/application privilege escalation (6661918)"
    },
    {
      "cve": "CVE-2008-3111",
      "discovery_date": "2008-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "454605"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Java Web Start Buffer overflow vulnerabilities (6557220)",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-3111"
        },
        {
          "category": "external",
          "summary": "RHBZ#454605",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454605"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3111",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-3111"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111"
        }
      ],
      "release_date": "2008-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-08-13T14:18:00+00:00",
          "details": "This update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html",
          "product_ids": [
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0636"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Java Web Start Buffer overflow vulnerabilities (6557220)"
    },
    {
      "cve": "CVE-2008-3112",
      "discovery_date": "2008-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "454606"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Java Web Start, arbitrary file creation (6703909)",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-3112"
        },
        {
          "category": "external",
          "summary": "RHBZ#454606",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454606"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3112",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-3112"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3112",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3112"
        }
      ],
      "release_date": "2008-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-08-13T14:18:00+00:00",
          "details": "This update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html",
          "product_ids": [
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0636"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Java Web Start, arbitrary file creation (6703909)"
    },
    {
      "cve": "CVE-2008-3113",
      "discovery_date": "2008-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "454607"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in Sun Java Web Start in JDK and JRE 5.0 before Update 16 and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create or delete arbitrary files via an untrusted application, aka CR 6704077.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Java Web Start arbitrary file creation/deletion file with user permissions (6704077)",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-3113"
        },
        {
          "category": "external",
          "summary": "RHBZ#454607",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454607"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3113",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-3113"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3113",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3113"
        }
      ],
      "release_date": "2008-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-08-13T14:18:00+00:00",
          "details": "This update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html",
          "product_ids": [
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0636"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Java Web Start arbitrary file creation/deletion file with user permissions (6704077)"
    },
    {
      "cve": "CVE-2008-3114",
      "discovery_date": "2008-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "454608"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to obtain sensitive information (the cache location) via an untrusted application, aka CR 6704074.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Java Web Start, untrusted application may determine Cache Location  (6704074)",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
          "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-3114"
        },
        {
          "category": "external",
          "summary": "RHBZ#454608",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454608"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3114",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-3114"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3114",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3114"
        }
      ],
      "release_date": "2008-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-08-13T14:18:00+00:00",
          "details": "This update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html",
          "product_ids": [
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586",
            "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0636"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Java Web Start, untrusted application may determine Cache Location  (6704074)"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.