RHEL 5 / 6:Satellite Server 中的 IBM Java Runtime (RHSA-2014:0982)

critical Nessus Plugin ID 79039

Synopsis

遠端 Red Hat 主機缺少一個或多個安全性更新。

描述

現已提供適用於 Red Hat Network Satellite Server 5.4、5.5 和 5.6 的更新版 java-1.6.0-ibm 套件,可修正數個安全性問題。

Red Hat 安全性回應團隊已將此更新評等為具有低安全性影響。可針對每個弱點從〈參照〉一節的 CVE 連結中取得常見弱點評分系統 (CVSS) 的基本分數,其中包含有關嚴重性評等的詳細資訊。

此更新可更正隨附於 Red Hat Network Satellite Server 5.4、5.5 和 5.6 之 IBM Java Runtime Environment 中的數個安全性弱點。在典型操作環境中,這些項目的安全性風險較低,因為運行時間並未用於不受信任的 applet。

IBM Java 2 Runtime Environment 中的多個瑕疵已修正。
(CVE-2013-5878、CVE-2013-5884、CVE-2013-5887、CVE-2013-5888、CVE-2013-5889、CVE-2013-5896、CVE-2013-5898、CVE-2013-5899、CVE-2013-5907、CVE-2013-5910、CVE-2013-6629、CVE-2013-6954、CVE-2014-0368、CVE-2014-0373、CVE-2014-0375、CVE-2014-0376、CVE-2014-0387、CVE-2014-0403、CVE-2014-0410、CVE-2014-0411、CVE-2014-0415、CVE-2014-0416、CVE-2014-0417、CVE-2014-0422、CVE-2014-0423、CVE-2014-0424、CVE-2014-0428、CVE-2014-0429、CVE-2014-0446、CVE-2014-0449、CVE-2014-0451、CVE-2014-0452、CVE-2014-0453、CVE-2014-0457、CVE-2014-0458、CVE-2014-0460、CVE-2014-0461、CVE-2014-0878、CVE-2014-1876、CVE-2014-2398、CVE-2014-2401、CVE-2014-2409、CVE-2014-2412、CVE-2014-2414、CVE-2014-2420、CVE-2014-2421、CVE-2014-2423、CVE-2014-2427、CVE-2014-2428)

建議 Red Hat Network Satellite Server 5.4、5.5 和 5.6 使用者升級至這些更新版套件,其中包含 IBM Java SE 6 SR16 版本。必須重新啟動 Red Hat Network Satellite Server (「/usr/sbin/rhn-satellite restart」),以及所有執行中的 IBM Java 執行個體,此更新才會生效。

解決方案

更新受影響的 java-1.6.0-ibm 和/或 java-1.6.0-ibm-devel 套件。

另請參閱

https://developer.ibm.com/javasdk/support/security-vulnerabilities/

https://access.redhat.com/errata/RHSA-2014:0982

https://access.redhat.com/security/cve/cve-2013-6629

https://access.redhat.com/security/cve/cve-2014-0424

https://access.redhat.com/security/cve/cve-2013-5888

https://access.redhat.com/security/cve/cve-2013-5889

https://access.redhat.com/security/cve/cve-2013-5887

https://access.redhat.com/security/cve/cve-2014-0410

https://access.redhat.com/security/cve/cve-2014-0417

https://access.redhat.com/security/cve/cve-2014-0415

https://access.redhat.com/security/cve/cve-2013-5899

https://access.redhat.com/security/cve/cve-2013-5898

https://access.redhat.com/security/cve/cve-2014-0368

https://access.redhat.com/security/cve/cve-2014-0411

https://access.redhat.com/security/cve/cve-2013-5878

https://access.redhat.com/security/cve/cve-2013-5910

https://access.redhat.com/security/cve/cve-2014-0416

https://access.redhat.com/security/cve/cve-2014-0373

https://access.redhat.com/security/cve/cve-2013-5907

https://access.redhat.com/security/cve/cve-2013-5884

https://access.redhat.com/security/cve/cve-2013-5896

https://access.redhat.com/security/cve/cve-2014-0428

https://access.redhat.com/security/cve/cve-2014-0422

https://access.redhat.com/security/cve/cve-2014-0376

https://access.redhat.com/security/cve/cve-2014-0423

https://access.redhat.com/security/cve/cve-2014-0375

https://access.redhat.com/security/cve/cve-2014-0387

https://access.redhat.com/security/cve/cve-2014-0403

https://access.redhat.com/security/cve/cve-2014-0429

https://access.redhat.com/security/cve/cve-2014-2414

https://access.redhat.com/security/cve/cve-2014-2412

https://access.redhat.com/security/cve/cve-2014-2398

https://access.redhat.com/security/cve/cve-2014-0457

https://access.redhat.com/security/cve/cve-2014-0453

https://access.redhat.com/security/cve/cve-2014-0452

https://access.redhat.com/security/cve/cve-2014-0451

https://access.redhat.com/security/cve/cve-2014-0458

https://access.redhat.com/security/cve/cve-2014-2427

https://access.redhat.com/security/cve/cve-2014-2421

https://access.redhat.com/security/cve/cve-2014-2423

https://access.redhat.com/security/cve/cve-2014-1876

https://access.redhat.com/security/cve/cve-2014-0446

https://access.redhat.com/security/cve/cve-2014-0460

https://access.redhat.com/security/cve/cve-2014-0461

https://access.redhat.com/security/cve/cve-2014-2428

https://access.redhat.com/security/cve/cve-2014-2420

https://access.redhat.com/security/cve/cve-2014-2401

https://access.redhat.com/security/cve/cve-2014-2409

https://access.redhat.com/security/cve/cve-2013-6954

https://access.redhat.com/security/cve/cve-2014-0449

https://access.redhat.com/security/cve/cve-2014-0878

Plugin 詳細資訊

嚴重性: Critical

ID: 79039

檔案名稱: redhat-RHSA-2014-0982.nasl

版本: 1.23

類型: local

代理程式: unix

已發布: 2014/11/8

已更新: 2021/1/14

支持的傳感器: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

風險資訊

VPR

風險因素: High

分數: 8.1

CVSS v2

風險因素: Critical

基本分數: 10

時間分數: 7.4

媒介: AV:N/AC:L/Au:N/C:C/I:C/A:C

時間媒介: E:U/RL:OF/RC:C

弱點資訊

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:6

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2014/7/29

弱點發布日期: 2013/11/18

參考資訊

CVE: CVE-2013-5878, CVE-2013-5884, CVE-2013-5887, CVE-2013-5888, CVE-2013-5889, CVE-2013-5896, CVE-2013-5898, CVE-2013-5899, CVE-2013-5907, CVE-2013-5910, CVE-2013-6629, CVE-2013-6954, CVE-2014-0368, CVE-2014-0373, CVE-2014-0375, CVE-2014-0376, CVE-2014-0387, CVE-2014-0403, CVE-2014-0410, CVE-2014-0411, CVE-2014-0415, CVE-2014-0416, CVE-2014-0417, CVE-2014-0422, CVE-2014-0423, CVE-2014-0424, CVE-2014-0428, CVE-2014-0429, CVE-2014-0446, CVE-2014-0449, CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0457, CVE-2014-0458, CVE-2014-0460, CVE-2014-0461, CVE-2014-0878, CVE-2014-1876, CVE-2014-2398, CVE-2014-2401, CVE-2014-2409, CVE-2014-2412, CVE-2014-2414, CVE-2014-2420, CVE-2014-2421, CVE-2014-2423, CVE-2014-2427, CVE-2014-2428

RHSA: 2014:0982