Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the IBMJava packages
Detailed Explanation for this Vulnerability Assessment
IBMJava2-JRE and IBMJava2-SDK packages that correct several security issues
are available for Red Hat Enterprise Linux 2.1.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
IBM's 1.3.1 Java release includes the IBM Java 2 Runtime Environment
and the IBM Java 2 Software Development Kit.
Vulnerabilities were discovered in the Java Runtime Environment. An
untrusted applet could use these vulnerabilities to access data from other
applets. (CVE-2006-6736, CVE-2006-6737)
Buffer overflow vulnerabilities were discovered in the Java Runtime
Environment. An untrusted applet could use these flaws to elevate its
rights, possibly reading and writing local files or executing local
Daniel Bleichenbacher discovered an attack on PKCS #1 v1.5 signatures.
Where an RSA key with exponent 3 is used it may be possible for a possible hacker
to forge a PKCS #1 v1.5 signature that would be incorrectly verified by
implementations that do not check for excess data in the RSA exponentiation
result of the signature. (CVE-2006-4339)
All users of IBMJava2 should upgrade to these updated packages, which
contain IBM's 1.3.1 SR10a Java release which resolves these issues.
Please note that the packages in this erratum are the same as those we
released on January 24th 2007 with advisories RHBA-2007:0023 and
RHEA-2007:0024. We have issued this security update as these previous
advisories did not specify that they fixed critical security issues. If
you have already updated to those versions of IBMJava you will not need to
apply this update.
Solution : http://rhn.redhat.com/errata/RHSA-2007-0072.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
|Super Micro CSE-825 SERVER W X9DRL-iF, Dual LGA 2011 Motherboard Heatsinks,1psu
|New Tray Carrier Bracket dust prevention dustproof for HP Microserver Gen8
|100pcs 4Pin FDD Floppy to 2-Port 15Pin SATA Female Cable for HP Microserver Gen8
|5x 4Pin FDD Floppy Female to 15Pin SATA Female HDD Cable for HP Microserver Gen8
No Discussions have been posted on this vulnerability.