Detalji
Kreirano: 26 Siječanj 2012
Uočeno je nekoliko sigurnosnih propusta kod programskog paketa IBM Java 1.4.2 koje je moguće iskoristiti za kompromitaciju aplikacija koje se u svom radu oslanjaju na spomenuti paket.
Paket:
IBM Java 1.4.2
Operacijski sustavi:
SUSE Linux Enterprise Server (SLES) 10
Kritičnost:
8.7
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
lokalno/udaljeno
Posljedica:
dobivanje većih privilegija
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-3389, CVE-2011-3545, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560
Izvorni ID preporuke:
#739256
Izvor:
SUSE
Problem:
Većina je nedostataka vezana uz pogrešku u Java Runtime Environment komponenti, a javlja se i nepravilnost zbog propusta u implementaciji SSL protokola.
Posljedica:
Nedostatke je moguće iskoristiti za utjecanje na dostupnost i pouzdanost programa koji u svom radu koriste navedeni paket.
Rješenje:
Problem se otklanja primjenom izdane nadogradnje.
Izvorni tekst preporuke
SUSE Security Update: Security update for IBM Java 1.4.2
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0122-1
Rating: important
References: #739256
Cross-References: CVE-2011-3389 CVE-2011-3545 CVE-2011-3547
CVE-2011-3548 CVE-2011-3549 CVE-2011-3552
CVE-2011-3556 CVE-2011-3557 CVE-2011-3560
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Java 10 SP4
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
IBM Java 1.4.2 SR13 FP11 has been released and contains
various security fixes.
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.mozilla.org/en-US/firefox/10.0/releasenotes/
<http://www.mozilla.org/en-US/firefox/10.0/releasenotes/>
(CVEs fixed: CVE-2011-3547 CVE-2011-3548 CVE-2011-3549
CVE-2011-3552 CVE-2011-3545 CVE-2011-3556 CVE-2011-3557
CVE-2011-3389 CVE-2011-3560 )
Security Issues:
* CVE-2011-3389
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
>
* CVE-2011-3545
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3545
>
* CVE-2011-3547
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3547
>
* CVE-2011-3548
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3548
>
* CVE-2011-3549
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3549
>
* CVE-2011-3552
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3552
>
* CVE-2011-3556
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3556
>
* CVE-2011-3557
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3557
>
* CVE-2011-3560
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3560
>
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
java-1_4_2-ibm-1.4.2_sr13.11-0.10.1
java-1_4_2-ibm-devel-1.4.2_sr13.11-0.10.1
- SUSE Linux Enterprise Server 10 SP4 (i586 ppc):
java-1_4_2-ibm-jdbc-1.4.2_sr13.11-0.10.1
- SUSE Linux Enterprise Server 10 SP4 (i586):
java-1_4_2-ibm-plugin-1.4.2_sr13.11-0.10.1
- SUSE Linux Enterprise Java 10 SP4 (i586 ia64 ppc s390x x86_64):
java-1_4_2-ibm-1.4.2_sr13.11-0.10.1
java-1_4_2-ibm-devel-1.4.2_sr13.11-0.10.1
- SUSE Linux Enterprise Java 10 SP4 (i586 ppc):
java-1_4_2-ibm-jdbc-1.4.2_sr13.11-0.10.1
- SUSE Linux Enterprise Java 10 SP4 (i586):
java-1_4_2-ibm-plugin-1.4.2_sr13.11-0.10.1
References:
http://support.novell.com/security/cve/CVE-2011-3389.html
http://support.novell.com/security/cve/CVE-2011-3545.html
http://support.novell.com/security/cve/CVE-2011-3547.html
http://support.novell.com/security/cve/CVE-2011-3548.html
http://support.novell.com/security/cve/CVE-2011-3549.html
http://support.novell.com/security/cve/CVE-2011-3552.html
http://support.novell.com/security/cve/CVE-2011-3556.html
http://support.novell.com/security/cve/CVE-2011-3557.html
http://support.novell.com/security/cve/CVE-2011-3560.html
https://bugzilla.novell.com/739256
http://download.novell.com/patch/finder/?keywords=051986200790170b4eac52e27d1e7141
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke